(FCSS Sec Ops) - Security Operations Analyst FortiAnalyzer 7.4 - Study Guide
(FCSS Sec Ops) - Security Operations Analyst FortiAnalyzer 7.4 - Study Guide
© FORTINET
https://training.fortinet.com
https://docs.fortinet.com
https://kb.fortinet.com
https://fusecommunity.fortinet.com/home
Fortinet Forums
https://forum.fortinet.com
https://support.fortinet.com
FortiGuard Labs
https://www.fortiguard.com
https://www.fortinet.com/nse-training
https://home.pearsonvue.com/fortinet
https://helpdesk.training.fortinet.com/support/home
3/28/2024
DO NOT REPRINT
© FORTINET
TABLE OF CONTENTS
DO NOT REPRINT
© FORTINET
FortiAnalyzer 7.4
Last Modified: 28 March 2024
In this lesson, you will learn about the security operations center (SOC), including its importance in an
organization, the roles it contains, and how it can succeed in protecting your network.
SOCs are essential in today's cybersecurity landscape for protecting your organization’s assets. Using skilled
analysts and a tool like FortiAnalyzer, you can integrate logging, analytics, and reporting, all under a single
pane of glass, which enables SOCs to efficiently identify and respond to incidents, streamline data
management, and improve operational efficiency with automation and real-time intelligence. This setup
bolsters SOC agility and fortifies security frameworks, preparing teams to effectively combat cyber
adversaries and highlighting the strategic benefits of FortiAnalyzer in security operations.
DO NOT REPRINT
© FORTINET
Lesson Overview
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
Objectives
• Describe the main functions and roles within a SOC
• Describe the main challenges within a SOC
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in understanding the main functions and roles within a SOC, you will be able to
recognize its operational framework and organizational dynamics.
DO NOT REPRINT
© FORTINET
What Is a SOC?
Threat Monitoring Continuous monitoring for security events and compromise indicators
What are the main functions of a SOC? As this slide shows, a SOC team is responsible for numerous
complex tasks that are performed on a daily basis.
A SOC plays a pivotal role in cybersecurity by monitoring, responding, collaborating, continuously improving
security measures, and ensuring adherence to industry-specific regulations.
DO NOT REPRINT
© FORTINET
SOC Roles
To fulfill the numerous functions of a SOC, you will need the appropriate personnel with diverse skillsets to
handle the following roles and responsibilities:
• SOC Manager/Team Lead: Organizes the day-to-day operations within the SOC, including but not limited
to, assigning resources and creating guidelines and policies.
• SOC Analysts: Analyze logs on the network and identify any meaningful deviations from the established
baselines.
• Security Engineers: Design, maintain, and configure the security infrastructure.
• Vulnerability Management Specialists: Assess the risk level of the network and identify vulnerabilities.
• Threat Hunters: Actively look for threats or signs of threats in the network.
• Threat Intelligence Analysts: Identify and analyze cyberthreats. They may use industry-standard attack
frameworks to identify the attack vectors and provide recommendations for mitigation.
• Incident Responders: Create, manage, and update the security incidents and events on a network. They
gauge the severity of events and inform management, as required.
• Forensics Analysts: Collect evidence, analyzing it, and determining the impact of a security incident.
Note that the responsibilities are not always clearly delineated. For example, a SOC manager may be
responsible for some analyst-centric tasks, such as reviewing incidents. Or a SOC analyst may also be
responsible for threat hunting tasks. In general, as an organization grows, it will have employees in more
dedicated roles within a SOC. Regardless of how big a SOC is, all personnel must work together,
communicate their findings, follow security policies, and react with precision to any threat.
DO NOT REPRINT
© FORTINET
Teams Within a SOC
Red team simulates adversaries
• Attempts to exploit vulnerabilities
• Conducts penetration tests and vulnerability
assessments
• Performs security research
Red Team Purple Blue Team Blue team defends against adversaries
Vulnerability Team • Identifies, responds to, and mitigates security
Security Monitoring
Assessment TTP creation incidents
Threat Hunting • Performs security monitoring, threat hunting, and
Penetration Tests
Security Security Controls forensics
Social Engineering Improvements • Detects, responds to and recovers from incidents
Forensics
Security Research Design
Exercises
Purple team orchestrates knowledge sharing
• Bridges the gap between red and blue teams
• Facilitates knowledge transfer
• Designs exercises
• Improves organizational security posture
• Creates TTP mapping
In the context of SOC and cybersecurity, the terms purple team, red team, and blue team refer to different
teams that work on identifying, assessing, and defending against security threats.
DO NOT REPRINT
© FORTINET
Reasons Why SOCs Fail or Succeed
To succeed, a SOC requires security and risk management leaders to provide the correct methodology,
technology, and personnel to combat cybersecurity threats. To maintain cybersecurity, a SOC must continue
to evolve because threats are continuously evolving: The number of attack vectors and the methods used to
exploit weaknesses in a network grow every year.
Successful SOCs have a solid understanding of the scope of the issues, the technologies being used or
considered, and the processes being affected. As your SOC team grows, you must consider the impact that
growth has on the scope, technology, and implementation requirements.
DO NOT REPRINT
© FORTINET
SOC Maturity
SOC
Forward-Leaning Productivity
Optimization
Greenfield
Real-Time Monitoring and Operations
As a SOC matures and learns, it builds the processes required to treat basic incidents, and starts to
differentiate event treatments based on event impact. At this stage, additional tools might be used to expedite
the initial assessment, and alerts might be aggregated and augmented with additional context.
More mature organizations might need to strengthen their ability to perform root cause analysis of the incident
and elimination of the threat. When a SOC closes an incident, they must ensure the risk of recurrence is
correctly handled. The refinement of the end-to-end workflow will result in optimized orchestration, improved
productivity, and overall forward movement of the SOC.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. Which SOC role is responsible for investigating logs to identify problems?
A. SOC analyst
B. Threat hunter
2. What is the role of the red team in a SOC?
A. To gather and analyze evidence, and determine scope of impact
B. To assess and exploit vulnerabilities
DO NOT REPRINT
© FORTINET
Lesson Progress
Good job! You now understand SOC main functions and roles.
Now, you will learn about the benefits of the Fortinet SOC.
DO NOT REPRINT
© FORTINET
Objectives
• Identify the challenges that the Fortinet SOC solves
• Describe the Fortinet SOC solution workflow
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in understanding the benefits of the Fortinet SOC, you will be able to select the
proper tools to improve your network security.
DO NOT REPRINT
© FORTINET
Benefits of the Fortinet SOC Environment
Reduces
operational
cost Reduces
Reduces
time to alert fatigue
respond
There are many benefits of leveraging the Fortinet SOC in your network.
FortiAnalyzer provides:
• Centralized logging with event correlation
• Integration with the Fortinet Security Fabric
• Integration with some third-party applications, such as Microsoft Teams and ServiceNow
• Device logging with event correlation and real-time threat detection
• Indicators of compromise (IOC) updated daily with the FortiGuard database
• Incidents and events management
• Automation with playbooks
When you use FortiAnalyzer in a SOC, you increase SOC productivity by addressing the following issues:
• Too many tools: Using a layered, multivendor approach can result in a SOC composed of multiple tools
that don't work together and require analysts with specialized skillsets, working in silos. Fortinet SOC
solves this.
• Volume of alerts: Automated false positive analysis and closure of tickets on third-party systems will
manage alert fatigue
• Manual processes: Automated playbooks can convert most manual analyst processes.
• Ineffective collaboration: Specialization means that not all analysts are equal. Some analysts handle only
specific types of incidents, such as phishing attacks, malware outbreaks, distributed denial-of-service
(DDoS) attacks, and so on. Analysts can be assigned incidents based on their skillset.
DO NOT REPRINT
© FORTINET
Fortinet SOC Solution Workflow
Data Collection
•
FortiGate
• FortiSwitch
• FortiManager
• FortiClient EMS
• And more
Incident Response
(Investigation/Containment/Remediation/Recovery)
Continuous
Reporting
Improvement
© Fortinet Inc. All Rights Reserved. 13
The flow chart on this slide shows one possible workflow of the Fortinet SOC solution. FortiAnalyzer allows
users to manage many components of the Fortinet SOC through its interface. Overall, Fortinet SOC works by
continuously collecting and processing data from various sources to detect potential security threats and
anomalies. When FortiAnalyzer detects a security threat, it generates alerts for the security team who then
investigate and take the necessary action. Playbooks execute or run behind the scenes, continuously
enriching the entire incident response flow. After the incident is handled, the SOC team can generate reports
to further analyze the incident and improve processes.
• Data Collection: The SOC solution collects data from various sources, such as FortiGate, FortiSwitch,
FortiManager, FortiSandbox, FortiClient EMS, and more.
• Data Processing: The SOC solution processes the collected data to identify potential security threats and
anomalies.
• Threat Detection: The SOC solution uses threat intelligence to detect security threats, such as malware,
phishing attempts, and suspicious network activity.
• Alerting: When the SOC solution detects a security threat, it generates alerts and notifications to the
security team.
• Incident Investigation: The security team investigates alerts to determine the severity and scope of the
security threat.
• Containment: If necessary, the security team takes action to contain the security threat and prevent it from
spreading.
• Remediation: The security team takes action to remediate the security threat, such as removing malware
or patching vulnerabilities.
• Reporting: The SOC solution generates reports to provide insights into the security posture of the
organization and to help improve future security strategies.
DO NOT REPRINT
© FORTINET
Integration Examples
• Connectors allow playbooks to
interact with devices in the
Security Fabric and standalone
devices
• They determine which actions can be
performed by playbook tasks
FortiAnalyzer can integrate with other Fortinet products and third-party applications. Connectors determine
which automated actions can be performed by playbooks. The available actions will vary depending on the
connector type used. Each connector type allows for different actions.
For FortiGate devices, you can also enable the automation stitch configuration in an event handler. When an
event is generated by an event handler with automation stitch enabled, FortiAnalyzer sends a notification to
the FortiGate automation framework. If an automation stitch is configured on the FortiGate device that
corresponds to that FortiAnalyzer event handler, the notification will trigger the related automation stitch and
activate an action in response. Some possible actions include FortiGate sending a custom email notification,
executing a CLI script, or performing a system action in response to the trigger.
Event handlers generate events when one of their configured rules matches incoming logs on FortiAnalyzer.
For example, the event handler can be configured with rules to match IP addresses, ports, or even a generic
text string. There are many predefined event handlers for Fortinet devices, such as FortiGate, FortiSandbox,
FortiMail, and FortiWeb. In addition to the predefined event handlers, you also have the option to create your
own.
DO NOT REPRINT
© FORTINET
An Example of Automation With a Playbook
1 FortiGate FortiSwitch
Internet Traffic
Automation 5
stitch runs Protected
Threat endpoints
intelligence Playbook sends
2 Logs
database webhook call
updates 4
3 Infected
endpoints
FortiAnalyzer
Event
detected
© Fortinet Inc. All Rights Reserved. 15
This slide shows an example of a playbook being used to automate tasks with FortiAnalyzer and other
networking devices:
DO NOT REPRINT
© FORTINET
Hands-On Labs–Use Cases Flow
• Lab 1: Adversary Behavior
• Review a mock security threat report
• Map adversary behavior (MITRE ATT&CK Navigator)
This slide shows the various activities you will be performing in the lab exercises, and which Fortinet SOC
products you will use. You will prepare for and execute incident handling over the course of four labs.
First, you will look at the security threat report provided by your security analyst to understand what type of
attack you are dealing with and how the attackers (adversaries) executed it. You will use the MITRE ATT&CK
enterprise model to map the attack into your system to see a visual representation of the different phases of
the attack. Sometimes, a visual representation can provide new or deeper insight into the attack.
Next, you will configure a FortiAnalyzer Fabric topology that contains one supervisor, two members, and a
single downstream collector that will send logs to one of the members.
Then, you will prepare your defense by building detection capabilities and identifying the data sources coming
from your Fortinet solutions (FortiMail and FortiSandbox) security event logs. These logs are forwarded to
FortiAnalyzer for analysis. You will configure data selectors and custom event handlers on FortiAnalyzer to
detect the threat tactics that the adversaries use. You will also configure connectors and playbooks to
automatically generate incidents and perform actions on the other Fortinet products.
Next, you will emulate a phishing attack, while verifying that all the predefined detection rules are working as
designed and generating the expected incidents.
Finally, you will configure playbooks to update and identify asset information, and to quarantine the infected
host using the FortiClient EMS.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. What determines the possible actions a playbook task can perform?
A. The event handler
B. The connector
DO NOT REPRINT
© FORTINET
Lesson Progress
Good job! You now understand the benefits of the Fortinet SOC.
DO NOT REPRINT
© FORTINET
Objectives
• Describe the MITRE ATT&CK Enterprise Matrix
• Describe the Cyber Kill Chain
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in the industry-standard attack frameworks, you will be able to understand and
identify attacks on your network.
DO NOT REPRINT
© FORTINET
MITRE ATT&CK Overview
ATT&CK = Adversarial Tactics, Techniques, and Common Knowledge
ATT&CK stands for: Adversarial Tactics, Techniques, and Common Knowledge. MITRE ATT&CK is also
referred to as the pyramid of pain.
It is a framework that provides a detailed mapping of adversary behavior. It is widely used for threat
intelligence and adversary emulation.
MITRE ATT&CK classifies and describes cyberattacks and intrusions through 14 tactics categories, each
representing a technical objective of an adversary. Not all tactics are shown on this slide. These categories
are further broken down into specific techniques and subtechniques.
The framework serves as an alternative to the Cyber Kill Chain developed by Lockheed Martin and offers
valuable insights for procedure, mitigation, and detection.
One of the main benefits of using MITRE ATT&CK framework is that it makes SOCs more effective.
FortiAnalyzer integrates with the MITRE ATT&CK Navigator to provide a comprehensive security solution.
The MITRE ATT&CK Navigator can be used by various members of the SOC team, including security
analysts, threat hunters, incident responders, and SOC managers, as a tool for visualizing and mapping
observed or potential adversary techniques and tactics to the ATT&CK framework. Using the MITRE ATT&CK
Navigator, SOC team members can enhance their understanding of the tactics and techniques used by
adversaries, improve threat detection and response capabilities, and align their defensive strategies with
industry best practices.
DO NOT REPRINT
© FORTINET
MITRE ATT&CK Overview (Contd)
Tactics
Techniques
Subtechniques
Expand to see
Note: To see all 14 tactics, access the ATT&CK Navigator:
subtechniques
https://mitre-attack.github.io/attack-navigator/
Using the matrices, you can identify a tactic, a technique, and potentially, a subtechnique. To view a
subtechnique, you must expand a technique that has one or more subtechniques. For example, the Active
Scanning technique displays a 0/3 value, which means there are three subtechniques, but currently none are
selected.
In the example shown of this slide, all three components are present:
• Tactics: Reconnaissance
• Technique: Active Scanning (T1595)
• subtechnique: Vulnerability Scanning (T1595.002)
Tactics represent the why of a technique or subtechnique. They explain what the adversary is trying to
accomplish, such as performing reconnaissance. The tactics are not designed to be interpreted as stages or
phases, and adversaries do not need to employ all tactics in the framework.
Techniques represent how an adversary fulfills their tactical goal by performing an action. For example, they
may perform active scanning for reconnaissance. Some techniques may have subtechniques, which are more
specific actions that are used to achieve their tactical goal. Furthermore, some techniques may fall under
more than one tactic.
DO NOT REPRINT
© FORTINET
MITRE ATT&CK Procedure, Mitigation, and Detection
• Procedure examples include information
about known bad actors who use a
technique
Note: Procedure, Mitigation, and Detection examples can be found at: https://attack.mitre.org/
© Fortinet Inc. All Rights Reserved. 22
Procedures are specific implementations adversaries have used for techniques or subtechniques. They are
documented in the MITRE ATT&CK framework based on observation of in-the-wild usage and can span
multiple techniques and subtechniques. Procedures are very dynamic in nature and difficult to scope in
advance because variations can affect coverage capabilities, such as detection and mitigation.
Detection covers high-level security concepts and classes of technology that can detect the execution of a
technique or subtechnique. In the example on this slide, the recommendation is to use monitoring to analyze
network traffic patterns. In other techniques, there may be malicious files involved in the security threat. In
general, if the technique or subtechnique is implemented or configured in a way that allows it to remove or
quarantine a malicious attachment, it is considered a mitigation (and, most likely, also a detection). If the
technique or subtechnique is only alerting but not preventing the delivery of the malicious attachment, it is a
detection.
DO NOT REPRINT
© FORTINET
MITRE ATT&CK Framework Matrices in FortiAnalyzer
• Cybersecurity tactics and techniques organized into matrices
Incidents & Events > MITRE ATT&CK > Attack Incidents & Events > MITRE ATT&CK > Coverage
The MITRE ATT&CK and MITRE ATT&CK ICS pages on FortiAnalyzer are based on the MITRE ATT&CK
framework matrices.
The column headers are the tactics in the matrices. They describe the adversary’s goal or objective—such as
performing reconnaissance—when they use techniques on your network.
The tiles in the columns are the techniques in the matrices. They describe how an adversary can achieve their
objective in your network, such as using active scanning to perform reconnaissance.
You can review the incidents and events associated with a technique, such as the severity, information on the
technique and subtechnique, affected endpoints, and the total number of incidents and events. For example,
the Compromise Infrastructure tile has nine associated events.
You can review event handler coverage on the Coverage section. It will show you the number of event
handlers and the percentage of coverage that FortiAnalyzer has against attacks in the matrices. The number
on each tile shows how many event handlers are associated with that technique. For example, the
Compromise Infrastructure tile has eight associated event handlers. You can click a tile to view the list of
event handlers related to that technique.
To leverage the MITRE ATT&CK ICS matrix, which is not depicted on this slide, the OT Security Service
license is required on FortiAnalyzer.
DO NOT REPRINT
© FORTINET
Cyber Kill Chain Overview
• Framework developed by Lockheed Reconnaissance Gather information about the target
Martin
• Identifies what adversaries have to Weaponization Use the gathered information to embed malware
complete in order to achieve their
objectives on a target
Delivery Transmission of the malware
• Derived from a military concept called kill
chain
Target system vulnerability
• Provide visibility and understanding of Exploitation
sophisticated attacks and attacker’s
tactics, techniques, and procedures Installation Malware is installed
• Consists of seven steps that represent
stages of advanced persistent threats Command & Connection to an outside server is established
(APT) Control
The Cyber Kill Chain is frequently referenced as a standard framework that provides a high-level description
of adversary activities during advanced and persistent attacks. The Cyber Kill Chain conveys important high-
level concepts in a way that is digestible for non-technical audiences, but it lacks the level of detail required
when you need to drill down to the more technical aspects of adversary activity.
DO NOT REPRINT
© FORTINET
Cyber Kill Chain in FortiAnalyzer
• In FortiAnalyzer, the predefined threat report is mapped to the Cyber Kill Chain stages
for correlation and pattern identification
This slide shows part of a generated threat report, which is a predefined report included with FortiAnalyzer.
This report maps the findings in the FortiAnalyzer report to stages of the Cyber Kill Chain. In this example
report, FortiAnalyzer has identified potential security breaches and mapped suspicious network traffic to
corresponding steps in the Cyber Kill Chain, such as reconnaissance activities; the use of risky, possibly
weaponized applications; detected vulnerabilities that could be exploited; and connections to command-and-
control server (C&C) sites.
DO NOT REPRINT
© FORTINET
Adversary Behavior—MITRE ATT&CK vs. Cyber Kill Chain
Scenario: Group ABC initially probes the potential target's email systems in search of valid email accounts.
The MITRE ATT&CK model offers a comprehensive and detailed information about adversary behavior,
enabling organizations to improve their defenses and incident response capabilities. The Cyber Kill Chain
model provides a structured approach to identifying and disrupting attacks at different stages. Organizations
often use aspects of both models, integrating them into their cybersecurity strategies to gain a more holistic
view of threats and develop effective defensive measures.
MITRE ATT&CK model:
1. Focus: The model primarily focuses on documenting and categorizing adversary tactics, techniques, and
procedures (TTPs) observed in real-world cyber attacks.
2. Granularity: It provides a highly granular and detailed view of adversary behavior, describing specific
actions and techniques used throughout different stages of an attack.
3. Coverage: It covers a wide range of tactics and techniques across different platforms and attack vectors,
offering a comprehensive view of adversary behavior.
4. Application: It is commonly used for threat intelligence, red teaming, and blue teaming activities. It helps
organizations understand and simulate adversary behavior, assess their defenses, and improve their
incident response capabilities.
Cyber Kill Chain model:
1. Focus: Focuses on the stages or phases of a cyber attack from initial reconnaissance to post-exploitation
activities.
2. Lifecycle perspective: It provides a structured, step-by-step representation of an attacker's activities,
aiming to identify and disrupt each stage of an attack.
3. Sequential approach: It follows a linear progression, emphasizing the sequential order of an attack's
stages.
4. Application: It is commonly used for incident response, security operations, and vulnerability
management. It helps organizations detect, respond to, and prevent cyber attacks by understanding an
attacker's likely progression and targeting specific stages.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. Which model or framework allows for a more detailed mapping of adversary
behavior?
A. MITRE ATT&CK
B. Lockheed Martin’s Cyber Kill Chain
2. Which one is a MITRE ATT&CK tactic?
A. Initial access
B. Exploitation
DO NOT REPRINT
© FORTINET
Lesson Progress
DO NOT REPRINT
© FORTINET
Objectives
• Review a simulated attack
• Understand how to use the ATT&CK Navigator
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in using the MITRE ATT&CK Navigator to map adversary behavior during a
simulated attack, you will acquire the knowledge and expertise necessary to map adversary behavior when
confronted with real-world cybersecurity threats.
DO NOT REPRINT
© FORTINET
Mapping Adversary Behavior
• Understanding adversary behavior is a crucial step in protecting your network and data
• The more you understand the techniques and the tools bad actors use, the more
effective you will be when formulating your strategy against threats
• In this section, you will review a use case to learn how to map adversary behavior to a
mock report
Understanding adversary behavior is essential to safeguarding your organization from threat actors. It
involves trying to anticipate the why and the how of the threat actors. For example, the technical goal of an
adversary is to obtain initial access. In order to achieve their goal, they perform phishing by propagating a
malicious link to users through email. After the phishing attempt is successful, the attacker may move on to
their next goal, such as gaining privileged access on the network.
When trying to map adversary behavior, it is important that you avoid jumping to a conclusion without first
performing a thorough evaluation. For example, you may see a technique that corresponds to multiple tactics,
but you need to evaluate if all of them apply to your scenario. It is also important to not let biases impact your
mapping, such as assuming that the most well-known or commonly seen exploit is the culprit.
DO NOT REPRINT
© FORTINET
Use Case—Healthcare Sector
Cybercriminals are attempting to use a phishing attack to ransom private data from your organization, a
hospital.
Your goal: Prevent your computer systems from breaking down, prevent
data from being compromised, and avoid disaster
Domain: Enterprise
In this use case, your organization, a hospital, is under threat by a fictional adversary, Group ABC. This group
seeks to infiltrate your security with the goal of stealing private patient information.
You will use this mock scenario to learn how to map adversary behavior. When you complete the associated
labs, you will have an opportunity to put what you learned in this lesson, and from this use case, into practice.
DO NOT REPRINT
© FORTINET
Mock Security Threat Report
This threat report describes a simulated attack by the fictional Group ABC. You will use this report to
map the behavior.
This report builds upon threat research information, gathered from our collaborators worldwide, that describes observed
tactics, techniques, and procedures associated with Group ABC activities.
“Group ABC initially probes their potential target's email systems in search of valid email accounts, most likely based on lists
of common usernames. Once they confirm valid email addresses on the target organization, Group ABC starts a
spearphishing campaign against select users. The following are some common characteristics found in similar campaigns:
a) The spearphishing emails usually contain an attached malicious Microsoft Office macro-enabled file.
b) Group ABC usually try to leverage potential hierarchy or power relationships to lure targets into downloading and
opening malicious files. They couple this with email content that conveys a sense of urgency and/or penalties to the
email recipient if they do not act immediately and as the message advises. Group ABC commonly sends the email to
accounts that potentially belong to system administrators, management, HR, and so on.
c) Group ABC generates a new version of the malicious artifact for each campaign, in order to prevent static detection
based on file hash. However, the files look the same in terms of content and they all include malware identified as
M/TrojanDropper.UR!tr.dldr.
This slide introduces a mock threat report, generated by FortiRecon, about Group ABC. As you read this
mock report, pay close attention to the italicized text, which will help you map adversary behavior later.
Observe that key verbs, such as “execute” and “probe”, have a strong correlation to the MITRE ATT&CK
framework tactics.
This report describes some key elements that you, as part of the purple team, will use to build the mapping of
their behavior using the MITRE ATT&CK Matrix for Enterprise.
DO NOT REPRINT
© FORTINET
Mock Security Threat Report (Contd)
After execution, the malware establishes a reverse TCP control channel with a C&C server using the maliciouswebsitetest.com
domain. The channel uses TCP port 443 in order to evade basic security controls that may block communication to nonstandard
ports on the internet.
After establishing initial access through spearphishing and malicious file execution, Group ABC uses a dropper to install a
VBScript on the target system. Then, they modify the Windows Run registry key to execute the VBScript as soon as a user logs
in to the compromised host. This process establishes persistence of the C&C channel, even when the initially compromised host
restarts.
After establishing persistence, Group ABC tries to clear the security audit log on the compromised target in order to evade
detection.
After this initial setup, Group ABC proceeds with execution of various actions on the compromised system, which are not
identifiable as a pattern at this point.”
The purple team analyses the threat report and identifies the key elements to build a mapping of
their behavior using the MITRE ATT&CK for Enterprise matrix
DO NOT REPRINT
© FORTINET
Adversary Emulation and Detection—Attack Flow
Adversary TTP communications flow Target
8 Persistence artifact (VBS script) transfer and Run Key creation (generates audit log)
9 VBS script executes and establishes second reverse TCP session to handler. Persistence
is achieved.
10 Windows Event Log (Security) is cleared to remove indicator of Run Key creation.
Log
This slide describes the entire adversary emulation attack flow that you will execute during one of the lab
exercises in this course.
In this lab exercise, you will alternate between playing the role of the attacker and playing the role of the victim
that interacts with the malicious email and attachment.
The attacking duties are handled by the red team, which aims to use the attack simulation to find holes in the
organization’s defense. With the vulnerabilities discovered from the attack, the red team can work with the
purple team to share knowledge with the blue team and improve the organization’s security posture.
It’s important that you review this flow prior to completing the lab exercises in this course, so that you better
understand the high-level context of the steps you will execute.
In addition, understanding the flow of an attack can help you identify the techniques or subtechniques used by
a threat actor group.
DO NOT REPRINT
© FORTINET
Using the MITRE ATT&CK Navigator
• You can access the MITRE ATT&CK Navigator here:
https://mitre-attack.github.io/attack-navigator/
• There are three matrices:
• Enterprise, Mobile, and Industrial Control System (ICS)
• They offer different tactics, techniques, and subtechniques
• Click Create New Layer to select the matrix type
You can use the MITRE ATT&CK Navigator to map adversary behavior. It allows you to visualize the MITRE
ATT&CK matrices and select tactics, techniques, and subtechniques. You can access the MITRE ATT&CK
Navigator using the URL on this slide.
You can create a new layer, and select the Enterprise, Mobile, or ICS matrix. The enterprise option focuses
more on traditional IT environments, the mobile option focuses more on mobile devices, and the ICS option
focuses more on industrial environments and operational technologies. This course focuses on the enterprise
option.
DO NOT REPRINT
© FORTINET
Using the MITRE ATT&CK Navigator (Contd)
• As an example, using information from the mock report, you
can create a mapping:
• Such as selecting the Gather Victim Identity Information technique, and
the Email Addresses subtechnique
• You can also use the scoring menu in the top right-hand
corner of the navigator by providing the techniques and
subtechniques a score value
• This will highlight the entries and make your mapping easier to read
Using information from the mock report as an example, you can create a mapping. The mock report contains
information about how Group ABC probes for email addresses, and then initiates a spearphishing campaign.
In the sample mapping shown on this slide, you can observe the Gather Victim Identity Information
technique, Email Addresses subtechnique, and scoring options.
DO NOT REPRINT
© FORTINET
Using the MITRE ATT&CK Navigator (Contd)
• You can also add comments using the icon
in the upper-right of the navigator
• Use comments to detail the adversary
procedures
An important component of the MITRE ATT&CK framework are the adversary procedures.
The ATT&CK Navigator does not have a specific object to map procedures, but you can use the comment
section of the subtechnique to annotate the Group ABC procedure that correspond to each tactic and
technique.
For example, you can type in a pertinent comment in the mock report related to how Group ABC probed the
email system of their potential targets in search of valid email accounts. In a real-world situation, you should
collect and document as many details as possible about an adversary, so adding comments about procedures
for every technique is recommended.
DO NOT REPRINT
© FORTINET
Example Mapping
The purple team identified the following information from the mock report:
Group ABC first performs a Reconnaissance (tactic) by using a list of common usernames to probe the
target’s email systems, in order to Gather Victim Identity Information (technique) and obtain Valid
Email Addresses (subtechnique) existing on the target.
The result of a
mapping
This slide shows an example from the mock report, to map the tactics, techniques, and procedures (TTPs) of
Group ABC’s attempt to compromise an email account.
As a member of the purple team, you will need to analyze a threat report, identify key elements, and use them
to build a mapping of adversary behavior using the MITRE ATT&CK Navigator. Use the high-level steps on
this slide to visualize the requirements you will need to complete a mapping.
You will map out numerous TTPs in the lab exercises in this course.
DO NOT REPRINT
© FORTINET
Saving and Exporting the Mapping
• You can rename the layer and export the mapping for future use
• You can also download the mapping and send your findings to other SOC
members as a JSON file
You can save your mapping, export it, and then send it to your entire SOC team to provide structured insight
into an adversary’s behavior.
When you save a mapping, be sure to give it a meaningful name. You can also download a mapping and save
it as a JSON file. This allows you to have a backup that you can import into the navigator later, if needed.
You also have the options to export a mapping as an Excel file or an SVG file.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. What is reconnaissance in the MITRE ATT&CK framework?
A. It is a technique.
B. It is a subtechnique.
C. It is a tactic.
DO NOT REPRINT
© FORTINET
Lesson Progress
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
Review
Describe the main functions and roles within a SOC
Identify the main challenges within a SOC
Identify what challenges can be solved with the Fortinet SOC
Describe the MITRE ATT&CK Enterprise Matrix
Describe the Cyber Kill Chain
Review a simulated attack
Use the ATT&CK Navigator
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you learned what a SOC is, what challenges can be
solved with the Fortinet SOC, what industry-standard attack frameworks are, and how to map adversary
behavior.
DO NOT REPRINT
© FORTINET
FortiAnalyzer 7.4
Last Modified: 28 March 2024
In this lesson, you will learn about the key features and concepts of FortiAnalyzer, including administrative
domains (ADOMs), operation modes, and the FortiAnalyzer Fabric.
FortiAnalyzer integrates logging, analytics, and reporting into one system, so you can quickly identify and
react to network security threats.
DO NOT REPRINT
© FORTINET
Lesson Overview
FortiAnalyzer Architecture
Operation Modes
FortiAnalyzer Fabric
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
FortiAnalyzer Architecture
Objectives
• Describe the purpose of FortiAnalyzer
• Describe administrative domains
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating a competent understanding of FortiAnalyzer key features and concepts, you will be able to
use the device effectively in your own network.
DO NOT REPRINT
© FORTINET
Centralized Log Repository
• FortiAnalyzer aggregates log data from one or more Fortinet devices
• Single view of security events taking place on a
range of devices
Supported devices:
• FortiGate/FortiCarrier
• FortiAnalyzer
• FortiAuthenticator
• FortiCache
• FortiClient
• FortiDDoS
• FortiMail
• FortiManager
• FortiNAC
FortiAnalyzer • FortiSandbox
• FortiWeb
• Syslog
• Chassis
Note: The list is not
exhaustive
© Fortinet Inc. All Rights Reserved. 4
FortiAnalyzer aggregates log data from one or more Fortinet devices, thereby acting as a centralized log
repository. Log aggregation provides a single channel for accessing your complete network data, so you don’t
need to access multiple devices, several times a day.
FortiAnalyzer can be integrated with many different Fortinet solutions. For a complete list, refer to the release
notes at docs.fortinet.com.
DO NOT REPRINT
© FORTINET
Centralized Log Repository (Contd)
Workflow:
1. Registered devices send logs to FortiAnalyzer
2. FortiAnalyzer buffers, reorganizes, and stores the logs
3. Administrators:
• View and search the logs
• Configure, request, and view reports (based on log data)
• Sample Topology:
FortiManager
FortiGate
Branch
Office
FortiGate Administrator
Headquarters
Data Center Logs
Branch
Office
FortiGate FortiAnalyzer
Reports
© Fortinet Inc. All Rights Reserved. 5
You can easily integrate FortiAnalyzer into a network, even if there are multiple sites. A sample topology can
include multiple branches and a headquarters. Each location’s firewall is added into FortiAnalyzer, and the
administrator can view logs and generate reports for the entire network, from a single interface.
DO NOT REPRINT
© FORTINET
Reports, Events, and Content Archiving
• Reports
• Network-wide reporting of device events, activities, and trends
• Archived, filtered, and mined for compliance or historical analysis purposes
• Events
• Identify and react to security threats quickly when configured conditions are met
• View events through Event Monitor (on the GUI), email, SNMP, or syslog
• Events that require further investigation can be used to generate new incidents
• Content archiving
• Simultaneously logs and archives full or summary copies of content transmitted over the network (email,
FTP, NNTP, and web traffic)
• Typically used to prevent sensitive information from leaving your network
Some key features of FortiAnalyzer include reporting, alert generation, and content archiving.
FortiAnalyzer reports provide a clear picture of network events, activities, and trends occurring on supported
devices. The reports collate information in logs so that you can interpret the information and, if necessary,
take any required actions. You can archive and filter the network knowledge you glean from these reports, as
well as mine it for compliance or historical analysis purposes.
Monitoring your network around the clock is not realistic. FortiAnalyzer events provide you with a way to see
and quickly react to threats, without having to constantly keep watch on your network. FortiAnalyzer can
generate events when specific conditions in the logs are met—conditions you configure FortiAnalyzer to
monitor for registered devices. You can view these events on the GUI, and you can also send them to multiple
recipients by email, SNMP, or syslog. You can escalate events that require investigation into incidents.
Content archiving provides you with a way to simultaneously log and archive full or summary copies of the
content transmitted over the network. You can use content archiving to prevent sensitive information from
leaving your organization's network. You can also use it to record network use. The data loss prevention
(DLP) engine can examine email, File Transfer Protocol (FTP), Network New Transfer Protocol (NNTP), and
web traffic, but you must configure the archive setting for each rule in a DLP sensor on FortiGate, so you can
specify what you want to archive.
DO NOT REPRINT
© FORTINET
Database Language Support
• FortiAnalyzer supports Structured Query Language (SQL) for logging and reporting
• FortiAnalyzer inserts log data into the SQL database for log view and report generation
• FortiAnalyzer uses a PostgreSQL database
• Advanced reporting capabilities require some knowledge of SQL and databases
SQL
FortiAnalyzer
SQL is the database language that FortiAnalyzer uses for logging and reporting.
Advanced reporting capabilities require some knowledge of SQL and databases. For example, you may need
to compose custom SQL queries, known as datasets, to extract the data you require from the database.
DO NOT REPRINT
© FORTINET
ADOMs
• ADOMs group devices for administrators Dashboard > System Information
to monitor and manage
• One or more devices are assigned to ADOMs
and administrators are assigned to administer
one or more ADOMs
• Purpose:
• To divide administration of devices and restrict
access
• VDOMs, a feature of FortiGate, further restrict
access
• To more efficiently manage data policies and
disk space allocation
• Set for each ADOM (not for each device)
# config system global
set adom-status {enable | disable}
ADOMs are not
end
enabled by default
ADOMs allow you to group devices for management and monitoring. For example, administrators can
manage devices that are grouped based on their geographical location or business division.
• Divide the administration of devices by ADOM and to control (restrict) administrator access. If your network
uses VDOMs, ADOMs can further restrict access to data that comes from the VDOM of a specific device.
• Make the management of data policies and disk space allocation, which are set per ADOM, more efficient.
ADOMs are not enabled by default and can be configured only by the default admin administrator (or an
administrator with the Super_User profile).
All Fortinet devices included in a Security Fabric can be placed into an ADOM of the Fabric type, allowing for
fast data processing and log correlation.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. What does FortiAnalyzer use for log viewing and report generation?
A. Queries on a database
B. Queries of plain text files
DO NOT REPRINT
© FORTINET
Lesson Progress
FortiAnalyzer Architecture
Operation Modes
FortiAnalyzer Fabric
DO NOT REPRINT
© FORTINET
Operation Modes
Objectives
• Describe FortiAnalyzer operation modes
• Configure FortiAnalyzer collectors
• Configure FortiAnalyzer analyzers
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in the configuration of collectors and analyzers, you can set up a topology
where FortiAnalyzer devices can work together to increase the overall performance of log receiving, analysis,
and reporting.
DO NOT REPRINT
© FORTINET
FortiAnalyzer Operation Modes—Analyzer
Dashboard > System Information
FortiAnalyzer has two modes of operation: analyzer and collector. The operation mode you choose depends
on your network topology and individual requirements.
You can change the operation mode in the System Information widget on the dashboard.
When operating in analyzer mode, the device acts as a central log aggregator for one or more log collectors,
such as a FortiAnalyzer device operating in collector mode, or any other supported device sending logs.
Analyzer is the default operation mode.
DO NOT REPRINT
© FORTINET
FortiAnalyzer Operation Modes—Collector
When operating in collector mode, FortiAnalyzer collects logs from multiple devices and then forwards those
logs, in their original binary format, to another device, such as a FortiAnalyzer operating in analyzer mode. It
can also send them to a syslog server or a common event format (CEF) server, depending on the forwarding
mode. A collector does not have the same feature-rich options as an analyzer, because its only purpose is to
collect and forward logs. It cannot perform event management or reporting.
DO NOT REPRINT
© FORTINET
Analyzer—Collector Collaboration
Analyzer
Collector Collector
Fortinet devices send logs to log collector Fortinet devices send logs to log collector
By using both analyzer and collector modes, you increase FortiAnalyzer performance: Collectors offload the
task of receiving logs from multiple devices from the analyzer. This allows the analyzer to focus on data
analysis and reporting tasks.
Furthermore, because a collector is strictly dedicated to log collection, its log receiving rate and speed are
maximized. If bandwidth is an issue, like in the case of slow WAN links, you can use the store and upload
option to send logs only during low-bandwidth periods.
Because the collector does not perform any analytics tasks, you should allocate most of its disk space to
archive logs.
DO NOT REPRINT
© FORTINET
Collector Configuration
Dashboard > System Information
• Enable collector operation mode
You can change the operation mode to collector using the System Information dashboard widget. Once you
change the operation mode, you will be logged out of FortiAnalyzer.
The next task is to configure the collector to focus on archiving. On this slide, you can see that analytics
retention is set to 0 days, whereas archive retention is set to 365 days. Also, the analytics to archive ratio is
set to 5% and 95%, respectively.
Note that the settings shown on this slide are only suggestions. The disk space configured, for example, is
most likely insufficient for a production network.
DO NOT REPRINT
© FORTINET
Collector Configuration (Contd)
• Enable log forwarding on the collector System Setting > Advanced > Log Forwarding
After you configure the data policy and disk utilization settings on the collector, you can configure log
forwarding.
You can also configure additional filters to control what type of logs are included, excluded, and if you want to
obfuscate fields:
• Device Filters: Select which devices are included.
• Log Filters: – Select which log types are forwarded.
• Enable Exclusions: – Enable to select which log types are excluded.
• Enable Masking: – Enable to determine which fields will be masked before logs are forwarded.
DO NOT REPRINT
© FORTINET
Analyzer Configuration
System Setting > ADOMs
On the analyzer, configure the data policy and disk utilization to focus on analytics. In the example shown on
this slide, the analytics retention is set to 60 days, whereas the archive retention is set to 0 days. There is a
reason why the collector archive retention is set to 365 days, but the analyzer analytics retention is not set to
the same range. The analytics to archive ratio is also set to 95% and 5%, respectively.
Remember that analytics logs take more space, so you must plan your data policy and disk utilization settings
carefully. Archive logs are compressed, but analytics logs are not (in order for quick access). As a result, you
can expect analytics logs to be roughly a few times larger.
The settings shown on this slide are only suggestions. You must consider what your organization requires in
your production network.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. Which FortiAnalyzer operation mode do you use for analytics?
A. Analyzer
B. Collector
DO NOT REPRINT
© FORTINET
Lesson Progress
FortiAnalyzer Architecture
Operation Modes
FortiAnalyzer Fabric
DO NOT REPRINT
© FORTINET
FortiAnalyzer Fabric
Objectives
• Describe FortiAnalyzer Fabric
• Review FortiAnalyzer Fabric topology
• Configure the FortiAnalyzer Fabric supervisor and members
• Describe Fabric groups
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in the initial configuration of FortiAnalyzer, you will be able to add FortiAnalyzer
to your network and perform basic administrative tasks.
DO NOT REPRINT
© FORTINET
FortiAnalyzer Fabric
• Enables centralized viewing of devices, incidents,
and events across multiple FortiAnalyzers devices
The FortiAnalyzer Fabric enables centralized viewing of devices, incidents, events, and reports across
multiple FortiAnalyzers.
Supervisors act as the root device in the FortiAnalyzer Fabric. Security operations center (SOC)
administrators can use the supervisor to view member devices and their ADOMs, authorized logging devices,
as well as incidents and events created on members. FortiAnalyzer syncs the incident and event information
from members to the supervisor using the API.
Members are devices in the FortiAnalyzer Fabric that send information to the supervisor for centralized
viewing. When configured as a member, FortiAnalyzer devices continue to have access to the FortiAnalyzer
features identified in the FortiAnalyzer Administration Guide. FortiAnalyzers configured with high availability
(HA) can become members. However, HA is not supported for FortiAnalyzers that are acting as the Fabric
Supervisor.
DO NOT REPRINT
© FORTINET
Sample FortiAnalyzer Fabric Topology
The supervisor can view the
information on the members
using an API. Members do Supervisor
not forward their logs to the
supervisor.
Collectors
Collectors cannot (optional)
be members
Fortinet devices send logs
On this slide, you can see a sample FortiAnalyzer Fabric topology comprising four FortiAnalyzer devices. The
Fabric supervisor, depicted at the top, is configured to view information on two Fabric members. Logging
devices cannot be registered to the Fabric supervisor. Instead, they are registered to one or more
FortiAnalyzers in analyzer mode, which act as Fabric members.
Note that the FortiAnalyzer Fabric can also include downstream collectors that forward logs to Fabric
members. In this sample topology, there is a single collector that forwards logs to one of the members. The
other member has no downstream collector, so devices are sending logs directly to it.
DO NOT REPRINT
© FORTINET
Configure FortiAnalyzer Supervisor
System Settings > Fabric Management
Note that the cluster name, session port, and secure connection settings must match the Fabric members.
You will also need to enable the soc-fabric administrative access option on any interface FortiAnalyzer is
using to communicate with any Fabric member. You can perform this part of the configuration on the CLI only.
Note that you need to be careful when changing the administrative access on an interface, especially if it is
the interface you use to manage FortiAnalyzer. In the example shown on this slide, if you enable only soc-
fabric, existing administrative access protocols are overwritten. To prevent that from happening, you must
define all your required protocols, such as HTTPS or SSH, and then also enable soc-fabric.
DO NOT REPRINT
© FORTINET
Configure FortiAnalyzer Member
System Settings > Fabric Management
Note that the cluster name, session port, and secure connection settings must match the Fabric supervisor.
You will also need to enable the soc-fabric administrative access option on the interface FortiAnalyzer is
using to communicate with the Fabric supervisor. You can perform this part of the configuration on the CLI
only.
DO NOT REPRINT
© FORTINET
Fabric Groups
• To filter information to specific FortiAnalyzer fabric members or ADOMs, you can
create Fabric groups
System Settings > Fabric Groups
Depending on the number of devices added to the FortiAnalyzer Fabric, you may wish to limit the scope of
information presented by the Fabric supervisor. You can filter information based on a specific set of
FortiAnalyzer Fabric members or ADOMs by creating Fabric groups on the FortiAnalyzer Fabric supervisor.
Once created, the Fabric groups are listed under Device Manager, and can be used to filter results
in FortiView, Log View, and Reports. In the example shown on this slide, the Fabric group FAZ-MSSP-FAZ-
SiteB contains different ADOMs across two FortiAnalyzer Fabric members: FAZ-MSSP and FAZ-SiteB.
Without using Fabric groups, you can still filter information on the Fabric supervisor, but you will need to
manually select the FortiAnalyzer devices and the ADOMs required. This could be time consuming if there are
many devices in your topology. By leveraging Fabric groups, you can easily and quickly apply filters.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. Which FortiAnalyzer operation mode must you configure Fabric members in?
A. Analyzer
B. Collector
DO NOT REPRINT
© FORTINET
Lesson Progress
Operation Modes
FortiAnalyzer Fabric
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
Review
Describe the purpose of FortiAnalyzer
Describe ADOMs
Describe FortiAnalyzer operation modes
Configure FortiAnalyzer collectors
Configure FortiAnalyzer analyzers
Describe FortiAnalyzer Fabric
Review FortiAnalyzer Fabric topology
Configure the FortiAnalyzer Fabric supervisor and members
Describe Fabric groups
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you learned about FortiAnalyzer key features and
concepts, and how to use FortiAnalyzer effectively in your network.
DO NOT REPRINT
© FORTINET
FortiAnalyzer 7.4
Last Modified: 28 March 2024
In this lesson, you will learn about the key features of FortiAnalyzer that make it essential to a SOC.
FortiAnalyzer integrates event monitors, event handlers, and incidents that can be generated from the logs it
receives, so you can quickly identify and react to network security threats.
DO NOT REPRINT
© FORTINET
Lesson Overview
Threat Hunting
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
Objectives
• Describe FortiAnalyzer SOC features
• Describe basic concepts and definitions related to FortiAnalyzer
SOC features
• Analyze NIST SP 800-61 computer security incident
handling guidelines
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in FortiAnalyzer SOC concepts and definitions, you will be able to identify and
describe the SOC-related features of FortiAnalyzer. You will also learn some guidelines for security incident
handling.
DO NOT REPRINT
© FORTINET
FortiAnalyzer SOC Features
The legacy SOC operation had many disadvantages that are not manageable in the modern dynamic world.
For example, it required analysts to handle too many alerts, often using separate interfaces, with the
predictable loss of efficiency when trying to solve security breaches.
DO NOT REPRINT
© FORTINET
Concepts and Definitions
Concept Definition
Security information and Fabric (SIEM) logs are a licensed feature that enables the FortiAnalyzer SIEM capabilities to
event management (SIEM) parse, normalize, and correlate logs from Fortinet products, as well as security event logs of
Windows and Linux hosts (with Fabric Agent integration).
Indicators of compromise The IOC service on FortiAnalyzer downloads the threat database from FortiGuard. The
(IOC) FortiGuard threat database contains the blocklist and suspicious list. IOC detects suspicious
events and potentially compromised network traffic using sophisticated algorithms on the threat
database.
Security event A record of an observed occurrence on a monitored information system. If an event is relevant
from an information security perspective, it can be considered a security event. On
FortiAnalyzer, events are generated using event handlers. Also, a Windows audit log entry
indicating a successful user login can be considered a security event.
Security incident An event that indicates a malicious or abnormal occurrence. On FortiAnalyzer, incidents are
escalated from events.
Indicator enrichment Querying threat intelligence sources about an indicator to obtain security context information. A
form of enrichment that is frequently used is checking the reputation of an indicator. For
example, you can verify if a given file hash is associated with known malware.
This slide shows some of the basic concepts that you should be familiar with when working in a SOC
environment.
SIEM is a technology that supports threat detection, compliance, and security incident management through
the collection and analysis of security events, as well as a wide variety of other event and contextual data
sources. Fabric (SIEM) logs are a licensed feature that enables the FortiAnalyzer SIEM capabilities to parse,
normalize, and correlate logs from Fortinet products, as well as security event logs of Windows and Linux
hosts (with Fabric Agent integration).
IOC are artifacts observed on a network or in an operations system where there is a high level of confidence
that the artifacts indicate a computer intrusion.
A security incident is an event that indicates a malicious or abnormal occurrence. On FortiAnalyzer, incidents
are escalated from events.
Indicator enrichment queries threat intelligence sources for an indicator to obtain security context information.
Checking the reputation of an indicator is a form of enrichment that is frequently used.
Even though these concept and definitions may vary depending on the source (including specific vendors and
products), it’s important to clarify a few definitions that are used during this training. Overall, the definitions
follow either market conventions, established standards, or those of Fortinet solutions.
DO NOT REPRINT
© FORTINET
NIST SP 800-61 Incident Handling—Overview
• Defines incident handling as a lifecycle with four phases
• Assists in
• Establishing computer security incident response capabilities
• Handling incidents efficiently and effectively
• Focuses on
• Analyzing incident-related data
• Determining appropriate response
• Agnostic and broad approach
• Can be followed independently of particular
hardware, OS, protocols, or applications
• Recommended practices for handling any type of incident
The content of this slide is based on copyright material from the National Institute of Standards and Technology (NIST) available online at https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final.
Incident handling is a process or life cycle, which means it’s constantly in execution: Even after a single
incident is resolved, the results feed back into the process for the next incident handling. The inner cycle
defined by NIST comprises of two phases: Detection and Analysis, and Containment, Eradication and
Recovery.
It’s important to note that even these two phases represent a cycle, meaning two things:
• Containment, Eradication & Recovery can trigger Detection and Analysis steps
• Detection and Analysis may trigger Containment, Eradication and Recovery actions even before Detection
and Analysis is fully concluded
Example: During Detection & Analysis, a SOC analyst may confirm a user account was compromised and
immediately create a request for the IT team to temporarily disable the compromised user account
(Containment). In this case, a Containment action may be taken even before Detection and Analysis is
finished.
In mature SOC practices, a single person rarely executes all incident handling tasks, and even different teams
may be involved in the process. The incident handling process also defines that certain steps must be
executed by specific teams, or approved by a manager.
DO NOT REPRINT
© FORTINET
NIST SP 800-61 Incident Handling—Detection and Analysis
• Prepare to handle any incident but focus on those that use common attack vectors, such as
external and removable media, web, and email
• Signs of an incident
• Precursors (relatively rare) – indicate an incident may occur in the future
• Indicators (common) – indicate an incident may have occurred or may be occurring now
• Common sources of precursors and indicators
• Intrusion detection and prevention systems (IDPS)
• SIEM
• Antimalware and antispam
• OS-level monitoring (file integrity, processes, and so on)
• Logs (OS, services, applications, and network devices)
• Network flows
The content of this slide is based on copyright material from NIST available online at https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final.
The incident response process has several phases. The initial phase involves establishing and training an
incident response team, and acquiring the necessary tools and resources. During preparation, the
organization also attempts to limit the number of incidents that occur by selecting and implementing a set of
controls based on the results of risk assessments.
Incident response methodologies typically emphasize preparation—not only establishing an incident response
capability so that the organization is ready to respond to incidents, but also preventing incidents by ensuring
that systems, networks, and applications are sufficiently secure.
For many organizations, the most challenging part of the incident response process is accurately detecting
and assessing possible incidents—determining whether an incident has occurred and, if so, the type, extent,
and magnitude of the problem. What makes this so challenging is a combination of three factors:
• Incidents may be detected through many different means, with varying levels of detail and fidelity.
Automated detection capabilities include network-based and host-based IDPSs, antivirus software, and log
analyzers. Incidents may also be detected through manual means, such as problems reported by users.
Some incidents have overt signs that can be easily detected, whereas others are almost impossible to
detect.
• The volume of potential signs of incidents is typically high.
• Deep, specialized technical knowledge and extensive experience are necessary for accurate and efficient
analysis of incident-related data.
Precursors and indicators are identified using many different sources. The slide shows some of the most
common ones.
DO NOT REPRINT
© FORTINET
NIST SP 800-61 Computer Security Incident Handling—
Containment, Eradication and Recovery
• Containment Recovery may involve actions, such as:
• Restore systems from clean backups and snapshots
• Often required and should be considered early
• Rebuild systems from scratch
• Decision-making is an essential part
• Replace compromised files with clean and reliable
• Strategies vary per incident versions
• Eradication and Recovery • Install patches
• Change passwords
• Identify affected resources, attacking resources, and
communication channels
• Eliminate components of the incident (delete
malware, disable compromised accounts, remove
persistence, and so on)
• Restore systems to normal operations
• Confirm systems are working normally
• Remediate vulnerabilities (if applicable)
The content of this slide is based on copyright material from NIST available online at https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final.
Containment is about stopping the adversary from progressing toward their objectives. Containment is
important before an incident overwhelms resources or increases damage. Most incidents require containment,
so that is an important consideration early in the course of handling each incident. A very straightforward
example of this is quarantining a compromised host to prevent the adversary from using it as a stepping stone
to other phases of the attack.
Eradication means eliminating the threat. Using the compromised host example, this could involve removing
malware and persistence mechanisms on the host. During eradication, it is important to identify all affected
hosts within the organization so that they can be remediated. For some incidents, eradication is either not
necessary, or is performed during recovery.
In recovery, administrators restore systems to normal operation, confirm that the systems are functioning
normally, and (if applicable) remediate vulnerabilities to prevent similar incidents. Using the compromised host
scenario, this could involve removing the host from quarantine so it can be used normally again on the
network.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. Which two FortiAnalyzer features automate common tasks? (Choose two.)
A. Playbooks
B. Connectors
C. Incidents
D. Indicators
DO NOT REPRINT
© FORTINET
Lesson Overview
Threat Hunting
Good job! You now understand FortiAnalyzer SOC concepts and definitions.
Now, you will learn about events, incidents, and event handlers on FortiAnalyzer.
DO NOT REPRINT
© FORTINET
Objectives
• Analyze and manage events and event handlers
• Customize event handlers
• Analyze and create incidents
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in events, incidents, and handlers, you can analyze and manage events and
event handlers, and analyze and create incidents.
DO NOT REPRINT
© FORTINET
Events and Event Handlers
• Events are generated by event handlers
• FortiAnalyzer is preconfigured with many event handlers
• You can create custom event handlers to generate events
• FortiAnalyzer filters all incoming logs using event handlers
• If logs match the conditions configured in an event handler, FortiAnalyzer generates an
event
• All the events that are generated can be viewed on the Events Monitor page
Event handlers generate events on FortiAnalyzer. FortiAnalyzer is preconfigured with many prebuilt event
handlers. However, FortiAnalyzer provides analysts with the ability to custom build their own event handlers to
generate events from logs that they determine are important.
FortiAnalyzer filters the logs it receives using event handlers and, if the logs received match the conditions
that are set in the event handlers, FortiAnalyzer generates an event.
You can view all generated events on the Events Monitor page.
DO NOT REPRINT
© FORTINET
How Are Events Generated?
Incident response options
Escalate to an
2. FortiAnalyzer incident
parses logs
Automation
1. FortiAnalyzer
3. FortiAnalyzer Analysis
receives logs
generates an
event if a rule is
matched in an
event handler
After receiving logs from other devices, and based on the details included in them, FortiAnalyzer uses event
handlers to determine whether new events need to be generated. Event handlers identify whether the
information in the logs matches a series of configurable criteria, such as threat type, device type, log type, and
so on.
FortiAnalyzer comes with many predefined event handlers that you can use. You can also clone and
customize them, or create custom event handlers from scratch.
You can view generated events under Event Monitor, where you can see them combined or further divided
by endpoint, threat, and system events.
If events warrant further attention and investigation, you can escalate them to incidents. From there, you can
correlate logs with the incident, look at an incident timeline, assign a priority and an analyst to review the
incident, and more. If there is a large volume of generated events, you may leverage playbooks to create,
handle, and resolve incidents.
DO NOT REPRINT
© FORTINET
Managing Event Handlers
• Event handlers look for specific conditions in logs
• Enable or disable event handlers as needed
• Disabled handlers do not generate events
Disabled handlers
don’t generate
events
An event handler looks for specific conditions in logs and, if a match exists, generates an event with details
that you can configure. FortiAnalyzer includes many predefined event handlers that you can enable to
generate events. You can also disable event handlers. Disabled handlers do not generate any events.
This slide shows a predefined event handler that has 15 rules and that has generated over 33 events on the
FortiAnalyzer device.
DO NOT REPRINT
© FORTINET
Event Handlers—Configuration
Incidents & Events > Handlers > Basic Handlers
• The configuration for each event handler
can include:
• MITRE attributes
• Data selectors (exclusion filters)
• Automation stitches Set MITRE
• Notifications ATT&CK domain
• Rules and technique
ID(s) the event
handler provides
coverage for
• Rules are granular conditions
• Event handler can have one or more rules
• Basic event handlers use the OR logic
• Correlation event handlers have many
operator logic options
Event handlers require configuration and fine-tuning to deliver only the desired events. The main configuration
page for the event handler allows you to enable the handler, type a name, and write a description for it.
You can also choose which MITRE domain the event handler falls under, and then select from a list of tech
IDs that correspond to the handler. Many predefined event handlers already have the MITRE attributes
configured. You can view the MITRE ATT&CK framework matrices under Incidents & Events.
You can also add a data selector, which is a common filter that is applied before every rule configured in the
event handler. Because of that, they are also known as exclusion filters.
When a handler generates an event with the automation stitch option enabled, FortiAnalyzer sends a
notification to the FortiGate automation framework, which then checks if there is a corresponding automation
stitch in FortiOS. If there is one, the configured action is triggered.
The Rules section contains the fields that must be matched up against logs in order to generate events. You
can disable, edit, or delete rules for the handler. The basic handler type uses an OR logic when evaluating
multiple rules. The correlation handler type has many more operator logic choices.
You can select a notification profile to send alerts whenever an event is generated by the handler.
DO NOT REPRINT
© FORTINET
Event Handlers—Rule Configuration
• Rules have many customizable fields Note: The fields available in the rules depend on the
Log Device Type value
• Not every field is required
Incidents & Events > Handlers > Basic Handlers
The screenshot on this slide shows the fields available for configuration inside a rule, including the log device
type, log type, and log subtype. Note that within rules themselves, both AND and OR logic are supported if
there are multiple conditions. The Log Field drop-down field presents common criteria you can select to
include in the filter. Alternatively, you can use generic text filters if you require precise filtering.
DO NOT REPRINT
© FORTINET
Event Handlers—Rule Configuration (Contd)
Incidents & Events > Handlers > Basic Handlers
• Define the condition that triggers an event
• There are three options:
• Count: A minimum threshold count of matching
logs
• Log Field value: Within a group, the log field
<log field> has <integer> or more
Used for data exfiltration and
unique values is only for log device type
• Sum: Multiple options such as duration, Fabric
sent/received bytes, and sent/received packets
• Additionally, configure the following in
relation to your selection:
• Time: All logs were generated within
<integer> minutes
If an event handler is generating too many events in your environment, you can configure the trigger
conditions such as count or sum, and the duration settings.
The trigger condition has three options that you can choose from: count, log field value, and sum. Additionally,
you can configure a time condition. The number of matching logs must occur in the specified duration in order
to generate an event.
You can also configure the event type, message, status, and indicator.
DO NOT REPRINT
© FORTINET
Event Handlers—Data Selectors
• Data selectors help narrow down events Incidents & Events > Handlers > Data Selectors
generated by devices, subnets, and filters:
• Devices (by name)
• Subnets (created in Fabric View)
• Filters (OR logic)
Data selectors help narrow down the events you want to see generated in event handlers. You can specify
various criteria within the data selector, including the devices, subnets, and additional filters. You must
configure a data selector first before you can apply it to an event handler.
Filters are granular rules to filter which types of logs match the data selector. You can create multiple filters
per data selector. The data selector matches filters with an OR logic.
The bottom screenshot on this slide shows the fields available for configuration inside a filter, including the log
device type, log type, and log subtype. Note that filters support both AND and OR logic within themselves.
The Log Field drop-down field presents common criteria you can select to include in the filter. Alternatively,
you can use generic text filters if you require precise filtering.
DO NOT REPRINT
© FORTINET
Event Status
• Events can be set to one of four statuses
Note: You can configure the desired event status manually in the handler
settings, or let FortiAnalyzer choose it automatically
Events in FortiAnalyzer can be set to one of four statuses. The status determines if more action needs to be
taken by the security team.
The Unhandled status means that the security event risk is not mitigated or contained, so it is considered
open. For example, an IPS or AV log with an action value of pass has the event status set to Unhandled.
Botnet and IOC events are also considered unhandled.
The Contained status means that the risk source is isolated. For example, an antivirus log with an action
value of quarantine has the event status set to Contained.
The Mitigated status means that the security risk is being blocked or dropped. For example, an IPS or
antivirus log with the action value of block or drop has the event status set to Mitigated.
The Event Status field is empty in other scenarios. For example, you can see both allow and block actions
in logs associated with that event.
DO NOT REPRINT
© FORTINET
Event Handlers—Generic Text Filters
• Generic text filters allow more precise and flexible control over which logs trigger an event
• Multiple operators and logic are supported
• Supported operators:
Operator Meaning
== Equal (exact match)
Tokens: '(', ')', '&', '|', 'and', 'or', 'not' Tip: Identify the logs that you want to generate
events for, and from the raw view, copy the strings
you want to match
© Fortinet Inc. All Rights Reserved. 20
When configuring an event handler, the use of generic text filters allows more precise and flexible control over
which logs trigger an event. These filters use operators based on regex and the Portable Operating System
Interface (POSIX) standard.
Event handlers support multiple operators and logic. You can hover your cursor over the question mark next
to Generic Text Filter to display an example, as shown on this slide.
Keep in mind that you must use the escape character “\” if you need to include a reserved character in your
filter, for example when separating different parts of a URL.
To avoid syntax errors, search raw logs to identify the logs you want to generate an event for, and directly
copy and paste the strings you want to match in the handler.
DO NOT REPRINT
© FORTINET
Managing Events
• Event Monitor displays events generated by the configured event handlers
Incidents & Events > Event Monitor
Critical severity
This is the event handler that
and marked as This is a snippet of Log View of
generated this event
unhandled correlated logs with the event
Double-click to see
the originating log Note: If you are receiving unexpected
events, check that the handler is
configured correctly
After event handlers start generating events, you can examine them in the All Events tab.
You can see events combined on the All Events tab, or further divided by endpoint, threat, and system
events.
Double-clicking an event provides more details about it, including the information from the associated logs.
Generally, you should give priority to events with an unhandled status and/or critical severity.
DO NOT REPRINT
© FORTINET
Available Management Actions for Events
• You can acknowledge an event, add a comment, assign it to an administrator, or create
an incident from it
Incidents & Events > Event Monitor
Acknowledged
events are not
shown by default
Create incidents
Right-click an event from events that
to see the list of require further
available actions investigation
Filter based on
the column values
to display events
of interest only
Right-clicking an event allows you to enter a comment for your records, acknowledge the event, assign it to an
administrator (or yourself) for further investigation, or create an incident from it.
Acknowledging an event removes it from the event list, but you can display it again by clicking Show
Acknowledged. Generally, you can acknowledge mitigated events because the related traffic was blocked by
the firewall.
An excessive number of mitigated events, despite being blocked repeatedly, may indicate a compromised
device. Additionally, if an event is used to generate an incident, you should acknowledge it after you mark the
incident as resolved.
You can use filters to display only the events of interest. For example, display only events related to IPS.
DO NOT REPRINT
© FORTINET
Creating an Incident
• An incident should be created when an event needs further analysis
• Can create manually or automatically (playbooks)
Incidents & Events > Event Monitor
Not all events have the same impact or importance on your network. Some of them might need further
analysis to prevent or mitigate security breaches. When an analyst finds an event that requires further
scrutiny, they should create a new incident from that event. You can think of an incident as an event that could
have negative consequence in your everyday operations.
You can create incidents manually or, preferably, automatically with the use of playbooks, taking advantage of
FortiAnalyzer automation capabilities.
In FortiAnalyzer, you create incidents manually from Event Monitor by right-clicking the desired event and
selecting the corresponding option.
Every incident includes a category, severity, status, affected endpoint and, optionally, a description, MITRE
attributes, and an assigned analyst.
DO NOT REPRINT
© FORTINET
Analyzing an Incident Incident #, description,
category, assignee, and
Incidents & Events > Incidents incident status
To view the details of an incident, go to Incidents, and then double-click the incident you want. You can also
right-click an incident, and then select Analysis.
The Analysis page provides all the relevant information and access to the tools an administrator needs to
perform a full investigation of the incident. Some of the details shown on this page include: the affected
endpoint and user (if available), the incident timeline, any executed playbooks and the ability to run them,
audit history with any attached events and reports, and several more.
At the bottom, these tabs provide more details: Comments, Events, Reports, Indicators, Affected Assets,
Processes, Software, and Vulnerabilities. You can add or delete entries to focus your investigation.
The list of events associated with the incident is also available under the tab with that name. From here, you
can access the related logs by right-clicking the event of interest. This opens the Log View in a different
window.
DO NOT REPRINT
© FORTINET
Editing an Incident Incidents & Events > Incidents
It is important to keep all incident settings up to date. This allows you to keep track of the work being done to
solve them.
When an incident is considered closed, you should change its status accordingly. Additionally, you can delete
resolved incidents from the list.
You can configure FortiAnalyzer to send notifications after any changes to an incident status.
DO NOT REPRINT
© FORTINET
Configure Incidents Settings
Incidents & Events > Incidents
Notification
example
Incidents usually go through several stages during the analysis process. In most cases, it is important to make
sure all parties involved are notified when the incident status changes.
You can configure FortiAnalyzer to send a notification to external platforms using preconfigured fabric
connectors.
To configure notifications, in Settings, select a fabric connector from the drop-down field, and then choose
the incident activity for which you want to send notifications.
You can add more than one fabric connector, each with the same or different notification settings. You must
configure the receiving side of the connector for the notifications to be sent successfully. As an example, this
slide shows a notification received in Microsoft Teams for an updated incident.
DO NOT REPRINT
© FORTINET
Use Case—Healthcare Sector
Your organization is a hospital targeted by cybercriminals through a phishing attack to ransom private
data
Our goal: Configure event handlers to detect the tactics and techniques
used by Group ABC
Domain: Enterprise
In the healthcare sector story from Lesson 1—SOC Concepts and Security Frameworks, the blue team
prepares to build their detection capabilities by configuring custom event handlers on FortiAnalyzer to detect
the various tactics and techniques used by Group ABC.
DO NOT REPRINT
© FORTINET
Blue Team Plan of Action: Detection Capabilities
• Configure custom event handlers and data selectors to identify:
• Probing attacks that target email systems in search of valid email accounts
• Spearphishing emails with attached malicious Microsoft Office macro-enabled files
• Defense evasion (clearing security audit logs on the compromised host)
Using their knowledge of events, incidents, and event handlers on FortiAnalyzer, the blue team configures
custom event handlers and data selectors to identify probing attacks that target email systems in search of
valid email accounts. The blue team also configures custom event handlers to detect spearphishing emails
that contain an attached malicious Microsoft Office macro enabled file.
The blue team creates custom event handlers on FortiAnalyzer to identify the initial access tactic
(spearphishing and malicious file execution), when Group ABC uses the dropper to install a VBScript on the
target system. The custom event handler detects the modifying Windows' Run registry key technique, which
executes the VBScript as soon as a user logs in to the compromised host and creates an event. The registry
key change establishes persistence of the C&C channel even in case of a reboot of the initially compromised
host.
The blue team also creates custom event handlers to identify the defense evasion tactic, when Group ABC
tries to clear the security audit log on the compromised target to evade detection.
DO NOT REPRINT
© FORTINET
Mock Security Threat Report (Contd)
Incidents & Events > Event Monitor
Events generated by
custom event handlers
configured by the blue
team
Incident created
on FortiAnalyzer to
Incidents & Events > Incidents monitor the event
This slide shows an example of the events generated by the custom event handler that was created by the
blue team to identify probing attacks that target email systems in search of valid email accounts and to detect
spearphishing emails which may contain an attached malicious Microsoft Office macro-enabled file.
DO NOT REPRINT
© FORTINET
Mock Security Threat Report (Contd)
Incidents & Events > MITRE ATT&CK
TheEvents
attackgenerated
is coveredbyon
FortiAnalyzer
custom eventbased
handlers
on
the
configured
MITRE ATT&CK
by the Purple
page Team
The slide shows the Reconnaissance and Initial Access tactics, and the Gather Victim Identity
Information and Phishing techniques that are covered.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. Which FortiAnalyzer feature generates events?
A. Playbooks
B. Event handlers
DO NOT REPRINT
© FORTINET
Lesson Overview
Threat Hunting
Good job! You now understand events, event handlers, and incidents.
DO NOT REPRINT
© FORTINET
Threat Hunting
Objectives
• Describe the threat hunting workflow
• Analyze threat hunting dashboards
• Analyze IOC information from compromised hosts
• Manage outbreak alerts
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in threat hunting, you will be able to analyze FortiAnalyzer threat hunting
dashboards and indicators of compromise (IOC) information from compromised hosts, as well as stay up-to-
date on outbreak alerts.
DO NOT REPRINT
© FORTINET
Threat Hunting
• Proactively search for suspicious or risky network activity that may have gone
undetected
• The process usually begins with a question:
• Are any advanced persistent threats (APTs) currently active in the network?
• The reference to tactics, techniques, and procedures (TTPs), behaviors, and indicators
helps to refine your questions further
• Frequently aligned with the MITRE ATT&CK or the Cyber Kill Chain frameworks
• You can also create an if-then statement, for example:
• If you suspect reconnaissance activities in the network, then you should see abnormal traffic trends
• A simplified example:
TTP: Yes
Hypothesis: Evaluate Investigate
Reconnaissance Gather and filter results:
Is there an data:
through Does the data
unusual amount
gathering victim Review SMTP confirm your No New hypothesis
of SMTP
identity Logs hypothesis? or hunting
requests?
information process
Threat hunting consists of proactively searching for suspicious or potentially risky network activity in your
environment. The proactive approach helps the analyst find any threats that might have eluded detection by
the current security solutions or configurations.
The threat hunting process usually starts with a broad question, or hypothesis, that determines which type of
threat you are trying to find. You can also start with an if-then statement. For example, If you suspect
reconnaissance activities in the network, then you should see abnormal traffic trends.
The process is frequently aligned to the MITRE ATT&CK or Cyber Kill Chain frameworks. This allows you to
refine your questions further. The frameworks are not mutually exclusive: You can use both frameworks
together to help analyze and protect your network.
DO NOT REPRINT
© FORTINET
Threat Hunting (Contd)
• The Threat Hunting dashboard takes advantage of the SIEM framework to allow for
advanced correlation and analysis to hunt for threats
Incidents & Events > Threat Hunting
SOC analytics
dashboard using
the SIEM
database
FortiAnalyzer includes the Threat Hunting pane, which offers a SOC analytics dashboard using the SIEM
database.
Threat Hunting uses cached data to allow SOC analysts to quickly drill down on logs in fields of interest. This
dashboard includes a Log Count chart and SIEM log analytics table.
You can configure a custom time range or apply filters to the dashboard to refine your search results further.
Only logs matching the selected time range and filter are displayed in the SIEM log analytics table.
The dashboard view has various columns that display detailed statistics, including count (number of logs),
percentage, sent bytes, and session duration information. Double-click an item in the table to view the detailed
log information.
You must examine the information on the Threat Hunting dashboard and differentiate normal from
anomalous behavior. For example, based on the image on this slide, you can ask the following questions:
• Is the number of SMTP logs for this time period expected?
• Is the amount of SMTP connections at this hour normal?
DO NOT REPRINT
© FORTINET
Log Count Chart
• Use the Log Count chart to focus on the logs you must analyze based on a time range
• The details in the SIEM log table auto adjusts to the timeframe you select in this chart
The top of the Threat Hunting dashboard shows a chart displaying the total log count during the specified
time range. This section is called the Log Count chart.
You can zoom in and out on the displayed time range by using the scroll wheel of your mouse, or by adjusting
the time bar below the graph. You can adjust the time bar by dragging the start and stop bars on either side of
the selected time range, or by clicking and dragging the entire time range to the left or right. For example, you
could search for suspicious activity occurring outside business hours.
Only logs displayed within the time period visible in the chart are shown in the SIEM log analytics table.
DO NOT REPRINT
© FORTINET
Threat Hunting Example With FortiAnalyzer
• Has Reconnaissance been used to gather victim identity information from the mail server?
• In this example, the analyst uses the Log Chart to discover an unusual number of SMTP requests
• Analysis shows that the IP address 100.64.1.20 is generating lots of queries within a short time period
Incidents & Events > Threat Hunting
• Further investigation determines that the queries are an external attacker gathering victim identity
information
• A new incident is created, and the SOC responders can start containment and eradication steps
This slide illustrates an example of how an analyst can use FortiAnalyzer to perform a threat hunting
procedure.
Based on the MITRE ATT&CK Reconnaissance tactic, and the Gather Victim Identity Information technique,
establish a question: Has Reconnaissance been used to gather victim identity information from the mail
server? This slide shows an example of the threat hunting of this scenario.
Using the Log Chart, the analyst finds that an unusual amount of SMTP traffic is being generated, including
outside normal operation hours. By analyzing the details of the SMTP logs, the analyst determines that the IP
address 100.64.1.20 is the main source of this abnormal traffic.
This triggers the creation of a new incident. The SOC team determines that the host is compromised and
initiates the SOC action plan to contain and eradicate this breach.
DO NOT REPRINT
© FORTINET
Indicators of Compromise (Compromised Hosts)
• The indicators of compromise (IOC) engine detects end users with suspicious web
usage compromises by checking new and historical logs against IOC signatures
• Uses FortiGuard threat intelligence to provide visibility of emerging threats
• Requires a FortiGuard subscription
FortiAnalyzer receives
updates to its threat
database from FortiGuard
The IOC engine detects end users with suspicious web usage by checking new and historical logs against the
IOC signatures, which are based on a FortiGuard subscription.
The IOC service on FortiAnalyzer uses the FortiGuard database to analyze web filter, DNS, and traffic logs
from FortiGate devices for breach detection. It is updated to provide coverage of emerging threats.
The breach detection engine does not analyze antivirus logs, IPS logs, and so on, because these threats are
already detected or prevented on FortiGate. When a threat match is found, a threat score is assigned to the
end user based on the overall ranking score.
When the check is completed, FortiAnalyzer aggregates all the threat scores of an end user and provides its
verdict on the overall IOC of the end user. The verdict can be one of the following:
• Infected which indicates a real breach. This means that the breach detection engine found one or many
matches of blocklisted IPs or domain generation algorithms (DGAs) in the web filter logs.
• Suspicious which indicates a possible breach with varying degrees of confidence.
DO NOT REPRINT
© FORTINET
Compromised Host IOC Example
FortiView > Threat & Events
This slide shows an example of an IOC trigger in FortiView. The IOC engine has determined a real breach,
as indicated by the Infected verdict. The # of Threats column indicates that three different threats are
associated with this hit.
When you double-click the desired entry, more details are displayed, and you can filter the view based on two
categories:
• Blocklist, which indicates items marked as infected after checking the blocklist included in the IOC
database downloaded from FortiGuard. You can verify that this traffic was blocked by clicking Details
under the Security Actions column. If you believe that the IP address or domain listed under the Detect
Pattern column is a valid one, you can report it as misrated by clicking that entry.
• Suspicious, which indicates a match was found in the suspicious list included in the IOC database
downloaded from FortiGuard. In this case, FortiAnalyzer flags the endpoint for further analysis, compares
the flagged log entries with the previous statistics of the endpoint for the same day, and then updates the
score. If the score exceeds the threshold, that endpoint is listed or updated in Compromised Hosts.
DO NOT REPRINT
© FORTINET
Outbreak Detection Service Overview
• Licensed feature
• Allows customers to receive information about malware outbreaks
• Automatically downloads new event handlers and reports related to the outbreaks
Incidents & Events > Outbreak Alerts
The FortiAnalyzer Outbreak Detection Service is a licensed feature that allows FortiAnalyzer administrators to
receive and view outbreak alerts, and automatically download related event handlers and reports from
FortiGuard. Outbreak event handlers and reports are created in real time by Fortinet to detect and respond to
emerging outbreaks.
The Outbreak Alerts pane displays alerts from Fortinet, which are available on all ADOMs.
DO NOT REPRINT
© FORTINET
Outbreak Alert Handlers and Reports
• New event handlers are added to the list of • The same is true for the newly
available handlers, and you can use them in downloaded reports
the same way as the rest in the list
Incidents & Events > Handlers Reports > Report Definitions
Reports downloaded
through the outbreak alerts
service
Event handlers downloaded
through the outbreak alerts
service
Once downloaded, the new handlers are available under the Event Handler list. The same management and
configuration functions are available for these handlers as the system default and custom handlers. That is,
you can clone them, export them, import them, and so on.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. The IOC engine analyzes new and historical logs against IOC signatures for which
type of hosts?
A. End users
B. Fabric devices
DO NOT REPRINT
© FORTINET
Lesson Overview
Threat Hunting
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
Review
Describe basic FortiAnalyzer SOC concepts, definitions, and features
Analyze and manage events, and customize event handlers
Analyze and create incidents
Describe the threat hunting workflow
Analyze threat hunting dashboards
Analyze IOC information from compromised hosts
Manage outbreak alerts
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you learned how to analyze and manage events,
customize event handlers, and analyze and create incidents. You also learned how to perform threat hunting
on FortiAnalyzer, analyze IOC information from compromised hosts, and manage outbreak alerts.
DO NOT REPRINT
© FORTINET
FortiAnalyzer 7.4
Last Modified: 28 March 2024
In this lesson, you will learn about the automation capabilities of FortiAnalyzer.
FortiAnalyzer integrates playbooks, connectors, and incidents that can be automated so you can quickly
identify and react to network security threats.
DO NOT REPRINT
© FORTINET
Lesson Overview
Playbook Concepts
Creating Playbooks
Configuring Connectors
Managing Playbooks
In this lesson, you will learn about the topics shown on this slide.
DO NOT REPRINT
© FORTINET
Playbook Concepts
Objectives
• Describe FortiAnalyzer automation capabilities
• Identify playbook components
• Describe trigger types and properties
• Describe playbook tasks
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in understanding the purpose of playbooks and their components, you will be
able to use playbooks effectively.
DO NOT REPRINT
© FORTINET
Why Automation?
Fabric View > Automation > Summary
• In general, the benefits of using
automation include:
• Improved productivity
• Increased efficiency
• Reduced costs
• Fewer human errors
Automation is critical for security teams who are facing the ever-changing threat landscape. Generally
speaking, automation improves productivity, reduces cost, increases efficiency, and minimizes human errors.
In a SOC environment, these benefits provide, among other results, faster response time, faster data analysis,
better use of analysts' time, better compliance management, and a more consistent security posture.
FortiAnalyzer allows SOC analysts to automate common and repetitive tasks using playbooks. FortiAnalyzer
works with standalone devices, but it is also integrated with the Security Fabric. This integration allows
FortiAnalyzer to communicate with other devices in the Security Fabric to detect security events, and trigger
corrective or preventive actions automatically, by running automated playbooks.
For example, you can create playbooks that automatically generate a report, or instruct the FortiClient EMS
server to quarantine a compromised host, just to mention two use cases. The available actions depend on the
device type. Using devices that are compatible with the Security Fabric allows you to exploit their capabilities
to their full extent.
DO NOT REPRINT
© FORTINET
Automation With a Playbook
3 Infected
endpoints
FortiAnalyzer
Event
detected
© Fortinet Inc. All Rights Reserved. 5
In this example, all network traffic traverses FortiGate. FortiGate sends all traffic and security logs to
FortiAnalyzer. FortiAnalyzer detects suspicious activity and generates an event. This event triggers the
execution of a playbook in FortiAnalyzer. The playbook sends a request to FortiClient EMS using the
FortiClient EMS connector. FortiClient EMS runs an automation stitch and applies the corrective or preventive
action.
DO NOT REPRINT
© FORTINET
Playbook Components
Playbook Designer
• Playbooks are ADOM-specific
• Each playbook has only one trigger Tasks execute actions
• Determines when a playbook executes
• Playbooks have one or more tasks
• Actions that will take place
• The actions that can be performed by a
task depends on the connector
The trigger makes
• Different devices (connectors) allow different
actions the playbook run
Playbooks include a starter event (trigger) that determines when a playbook runs, and one or more tasks that
are executed.
After a playbook is triggered, it flows through the existing tasks defined within the playbook designer.
Each task includes the automated action that needs to take place. The available actions depend on the
connector used. Connectors allow tasks to be performed on supported devices.
You can create playbooks from scratch or using predefined templates. Playbooks are available only in the
ADOM where they were created, unless they are exported to a different ADOM.
DO NOT REPRINT
© FORTINET
Playbook Concepts
• A simple playbook execution sequence
• Tasks run one after another
Playbook is
Task 1 runs Task 2 runs Task 3 runs
triggered
An incident is
created
In the simplest design, a playbook consists of a trigger and a series of tasks that are executed one after the
other. However, playbooks also allow for more complex designs that involve multiple tasks running
simultaneously. Additionally, if needed, the output of one task can be used by the tasks that follow it.
For example, one task can collect specific events and the following task can add those events to an incident.
DO NOT REPRINT
© FORTINET
Triggers
Every playbook starts with a trigger that determines when the playbook is executed. Each playbook can
include only one trigger. After a playbook is triggered, it flows through the configured tasks, as defined in the
playbook designer.
The event, incident, and on-schedule triggers are automatic and activates when specific conditions are met.
You can use the on-schedule trigger for manual playbook execution.
Note that playbooks with the ON_SCHEDULE trigger can also be executed manually. This allows you to test
them outside of their configured timeframe.
DO NOT REPRINT
© FORTINET
Triggers (Contd) Fabric View > Automation > Summary
Example
The trigger type determines the options you can configure to control when the playbook will run. For example,
you can configure an event trigger to run only when FortiAnalyzer detects an event with a particular event
handler.
When configuring multiple conditions for a trigger, you can specify whether all conditions must match or any
one condition must match.
DO NOT REPRINT
© FORTINET
Fabric View > Automation > Playbook
Tasks
• Tasks are actions that are
executed when the playbook runs
• Available actions depend on the
connector
• Chain one task to another task to
execute a sequence of actions
• The output of a task can be used
as an input for the next task in the
sequence
Tasks are actions that are executed when the playbook runs. Each trigger event can start the execution of one
or more tasks, and each task can perform one action.
You can also configure tasks so that the output of one task is used as an input by another task in sequence.
For example, you can create a task to retrieve some data, and then provide that data to the next task for
report generation.
When adding a new task, you must choose a relevant connector before you can select an action. On this
slide, the actions associated with the local connector are shown. The available actions will vary depending on
the connector type that you select.
You can configure tasks to use the default preconfigured values, or take inputs from the trigger or from
preceding tasks. You must configure automation rules on FortiGate before you can see the list of available
actions on FortiOS connectors.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. Which trigger type must you use to manually run a playbook?
A. Event_Trigger
B. On_Demand
2. Which playbook element determines the available actions a task can perform?
A. Connectors
B. Trigger type
DO NOT REPRINT
© FORTINET
Lesson Progress
Playbook Concepts
Creating Playbooks
Configuring Connectors
Managing Playbooks
DO NOT REPRINT
© FORTINET
Creating Playbooks
Objectives
• Create new playbooks from a template
• Customize playbook settings
• Create new playbooks from scratch
• Use variables in tasks
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in automating tasks with playbooks, you will be able to increase the efficiency
of your organization’s SOC operations.
DO NOT REPRINT
© FORTINET
Creating Playbooks From a Template
• FortiAnalyzer includes several playbook templates
• You can customize the playbooks created from these templates to fit your needs
Fabric View > Automation > Playbook
FortiAnalyzer includes several playbook templates that SOC analysts can customize. You can use the
templates to perform tasks such as:
• Investigate compromised host incidents and critical intrusion incidents.
• Enrich data for assets and identity, and for hosts under investigation.
• Block command-and-control (C&C) IP addresses.
• Quarantine and run antivirus scans on endpoints.
DO NOT REPRINT
© FORTINET
Customizing Playbook Settings
• A new playbook created from a template is preloaded with all required components
• You can remove or customize tasks to meet your needs
After you select a playbook template, the playbook designer is displayed with a preconfigured trigger and one
or more tasks. The preconfigured trigger and tasks will be different, based on the template you select. You
can configure, add, or remove tasks to customize the playbook.
After this playbook runs, the incident will include relevant information that the analyst can use during an
incident investigation. Note that before configuring a task to run a report, you must verify that the report exists,
and that the auto-cache and extended log filtering settings are enabled.
DO NOT REPRINT
© FORTINET
Customizing Playbook Settings (Contd)
Fabric View > Automation > Playbook
Customize the
playbook name and
description
By default, every new playbook you create from a template is preconfigured with a generic name and time
stamp. This can make them difficult to distinguish, so it’s highly recommended that you edit the names and
descriptions of new playbooks to something easily recognizable.
To add new tasks, click and drag the connector tabs attached to the current tasks or the trigger. This creates
an empty task that you can configure. To connect tasks to each other or to the trigger, click and drag a
connector tab onto another connector tab.
DO NOT REPRINT
© FORTINET
Creating a New Playbook From Scratch
Fabric View > Automation > Playbook
FortiAnalyzer needs a
few minutes to parse a
newly created playbook
If none of the templates fits your needs, you can always create a playbook from scratch.
First, you must select a trigger. For some triggers, you can add filters to make sure that the playbook runs
only if a specified condition is matched.
You must configure a task or multiple tasks that you want to execute. You can also configure filters to limit the
action scope which will reduce unnecessary data processing. For example, when you configure a task to
retrieve events, configure a filter to retrieve events generated by a specific event handler, or events with a
specific severity.
Also, keep in mind that after you create a new playbook, FortiAnalyzer needs a few minutes to parse it. If you
try to run a newly created playbook configured with an on-demand trigger before it is parsed, FortiAnalyzer
generates an error message as shown on this slide.
DO NOT REPRINT
© FORTINET
Variables
• You can use output variables and trigger variables in playbook tasks
• Output variables: Output of previous task is the input of current task
• Format: ${task_id.output}
• Previous task ID required
• Trigger variables: Use some of the information from the trigger to filter the action in the
task
• Format: ${trigger.variable}
Fabric View > Automation > Playbook
You can use variables when configuring tasks. There are two types of playbook variables: output variables
and trigger variables.
Use output variables to take the output from a preceding task as an input for the current task. An output
variable consists of the task ID, followed by the task output, as shown on this slide.
The example shown on this slide shows a task configured to use a report as an input from a preceding task to
update an incident.
Use trigger variables to take information from the trigger step of a playbook configured with an event or
incident trigger. For example, a playbook configured with a report action requires filtering based on an
endpoint IP address. You can retrieve this information from the triggering event using a trigger variable.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. Which type of variable takes the output of a preceding task as the input of a current
task?
A. Trigger variable
B. Output variable
DO NOT REPRINT
© FORTINET
Lesson Progress
Playbook Concepts
Creating Playbooks
Configuring Connectors
Managing Playbooks
DO NOT REPRINT
© FORTINET
Configuring Connectors
Objectives
• Describe connector types
• Configure connector actions
After completing this section, you should be able to achieve the objectives shown on this slide.
By demonstrating competence in connectors, you will understand how FortiAnalyzer uses connectors in
conjunction with playbooks to automate actions to be performed on other Fortinet devices.
DO NOT REPRINT
© FORTINET
Connectors
• Allow playbooks to interact with devices
Fabric View > Automation > Connectors
in the Security Fabric and other
standalone devices
• Determine which actions can be
performed by playbook tasks
• The local connector does not need any
additional configuration
• All other connector types must be configured
• The connector status icon is colour
coded:
• Green: connection successful
• Black: connection unknown
• Red: connection down
Status icon
Connectors determine which automated actions playbooks can perform. Each connector type supports
different actions.
You can quickly determine the API connection status of a connector, which is indicated by a colored status
icon.
By default, you can use the local connector in playbooks without any additional configuration. All other
connectors require additional configuration.
For example, the FortiOS connector is listed as soon as you add the first FortiGate device to FortiAnalyzer.
However, to see the actions related to that FortiOS connector, you must enable an automation rule using an
incoming webhook call trigger on the FortiGate device.
DO NOT REPRINT
© FORTINET
Connector Types
• Two types of connectors Fabric View > Fabric Connectors
• Security Fabric
• ITSM
• Security Fabric connectors:
• FortiClient EMS
• FortiMail
• FortiCASB
• ITSM connectors:
• Service Now
• Slack
• MS Teams
• Generic: Support additional third-party
ticketing platforms
On FortiAnalyzer, there are two types of connectors that you can configure on the Fabric Connectors page:
Security Fabric and IT service management (ITSM)
Security Fabric connectors include FortiClient EMS, FortiMail, and FortiCASB connectors.
ITSM connectors include connecting to third-party service management or ticketing software such as Service
Now, Slack, MS Teams, and so on. FortiAnalyzer also supports a generic connector type to facilitate
integration with additional third-party ticketing software.
DO NOT REPRINT
© FORTINET
Connector Actions
• Connector actions are automated
• Each connector has its own set of actions
• Connector actions are predefined
Fabric View > Fabric Connectors
FortiMail
connector
actions
FortiClient EMS
connector actions
Each connector has its own set of predefined actions. These actions are automated and are performed in
playbooks.
An example of when you might use a connector action in your network is to have a FortiClient EMS connector
regularly retrieve a list of endpoints or perform quarantine actions on compromised endpoints.
DO NOT REPRINT
© FORTINET
Use Case
Fabric View > Automation > Playbooks
3
2
Infected host is
quarantined
This slide shows an example of a playbook using the FortiClient EMS connector.
FortiAnalyzer has generated an event indicating that a host is infected after downloading a malicious file. The
analyst has configured a playbook with a FortiClient EMS connector to quarantine infected hosts.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. Which connector requires additional configuration?
A. FortiOS connector
B. Local connector
DO NOT REPRINT
© FORTINET
Lesson Progress
Playbook Concepts
Creating Playbooks
Configuring Connectors
Managing Playbooks
Now, you will learn about managing playbooks and connectors on FortiAnalyzer.
DO NOT REPRINT
© FORTINET
Managing Playbooks
Objectives
• Monitor playbooks
• Export and import playbooks
• Review the mock threat report
After completing this section, you will be able to achieve the objectives shown on this slide.
By demonstrating competence in monitoring playbooks, you will be able to identify whether all automated
tasks ran successfully. You will also be able to export playbooks to another ADOM or device.
DO NOT REPRINT
© FORTINET
Monitoring Playbooks This playbook has
three tasks: One task
• To see the playbook execution logs, click Details and then View Log is successful but the
other two failed
Fabric View > Automation > Playbook Monitor
When you troubleshoot playbooks, you must review the logs. Details about the execution of a playbook are
available in the associated log.
In the playbook monitor, all playbook jobs that include one or more failed tasks are assigned a failed status. A
failed status, however, does not mean that all tasks in the playbook failed. Other task actions in the playbook
may execute successfully.
In the example shown on this slide, the spearphishing attachment playbook has three configured tasks, two of
which failed to run—incident spearphishing and attach data to incident. Therefore, the playbook job is
considered to have failed.
DO NOT REPRINT
© FORTINET
Monitoring Playbooks (Contd)
Fabric View > Automation > Playbook Monitor
To determine where exactly the task execution failed, you must view the raw logs.
The example on this slide shows the raw logs for the incident spearphishing task. The raw logs indicate that
the task is expecting an integer value input for the epid variable but received a Base 10 IP address instead.
DO NOT REPRINT
© FORTINET
Exporting Playbooks Fabric View > Automation > Playbook
• Playbooks are defined per ADOM
• Export playbooks to use them in a
different ADOM or FortiAnalyzer device
• You can include the connectors in the
exported file
• The exported file is in JSON format
• You can also compress the file
Including the
connectors ensures all
required components
are exported
Playbooks are defined per ADOM. If you want to use an existing playbook in a different ADOM or a different
FortiAnalyzer device, you must export the playbook.
To export a playbook, right-click the playbook, and then click Export. You can export more than one playbook
at a same time by selecting multiple playbooks.
When exporting a playbook, you can choose to export the connectors. Connectors required to run the
playbook will be included in the exported file. This will preserve the connector configuration with the playbook
configuration.
You can export the playbook in two formats: plain text JSON or zipped base 64 encoded JSON. If you want a
human-readable file, then you must choose the text version during the export process.
DO NOT REPRINT
© FORTINET
Importing Playbooks
• Import a previously exported playbook on the destination ADOM or device
Fabric View > Automation > Playbook
To import a playbook, right-click anywhere on the playbook dashboard, and then click Import.
If the imported playbook has the same name as an existing playbook, to avoid conflicts, FortiAnalyzer will
append a timestamp to the imported playbook name.
Playbooks are imported with the status they had (enabled or disabled) when they were exported. Playbooks
with automatic triggers (incident or event) should be exported while they are disabled, to prevent the playbook
from unintentionally running after import.
DO NOT REPRINT
© FORTINET
Playbooks Dashboard
• This dashboard tracks all playbooks executed in the last seven days
Fabric View > Automation > Summary
AAplaybook
playbook
cancan
have
have
These two playbooks
multiple
multiple
actions
actions. have run more than
all of the other
playbooks, which
could be normal or
caused by a
misconfiguration
The playbook dashboard shows the number of playbooks executed, which playbooks have executed,
playbook actions executed, and any trends in the total executed playbooks and actions.
This dashboard shows all the playbooks that have been executed in the last seven days, including their
names, and the total number of actions performed. This information gives you an idea of how much time has
been saved by automating tasks.
In the example shown on this slide, 2388 playbooks have been executed. However, 10,730 actions have been
taken. This shows that one or more of the playbooks listed have more than one action configured. The image
also shows the names of the most frequently executed playbooks. It is the responsibility of the SOC analyst to
ensure playbooks are correctly configured so they run only when required.
DO NOT REPRINT
© FORTINET
Use Case—Healthcare Sector
Your organization is a hospital targeted by cybercriminals through a phishing attack to ransom private
data
Domain: Enterprise
In the healthcare sector story from Lesson 1—SOC Concepts and Security Frameworks, the blue team
prepares to automate their actions using playbooks and connectors on FortiAnalyzer.
DO NOT REPRINT
© FORTINET
Blue Team Plan of Action: Automation
• Configure playbooks to run because of the following detection events:
• Probing attacks that target email systems in search of valid email accounts
• Spearphishing emails with attached malicious Microsoft Office macro-enabled files
• Configure the FortiClient EMS connector and playbooks to automate the following tasks:
• Retrieve a list of all endpoints with FortiClient site and UUID information
• Quarantine identified compromised host (containment)
• Release sanitized host from quarantine (recovery)
Using their knowledge of playbooks on FortiAnalyzer, the blue team configures playbooks to run when an
event handler triggers by identifying probing attacks by Group ABC. The probing attack targets email systems
in search of valid email accounts. The blue team also configures playbooks to automatically run when an
event is created after detecting spearphishing emails that contain an attached malicious Microsoft Office
macro-enabled file. These playbooks create incidents that can be used to track and follow the investigation
into these attacks. The playbooks also attach data from events created by the corresponding event handlers
to these incidents for easy access.
The blue team uses their knowledge of connectors on FortiAnalyzer to configure the FortiClient EMS
connector. This automatically creates several playbooks, one of which the blue team uses to retrieve a list of
all endpoints that include important data such as the FortiClient site and FortiClient UUID, which are updated
in the FortiAnalyzer Asset Identity Center. The blue team also configures a playbook to use in the containment
phase of incident handling. The containment phase playbook quarantines the identified compromised host
following an investigation into the malicious file download. Finally, the blue team configures a playbook to use
in the recovery phase of incident handling. The recovery playbook releases the sanitized host from
quarantine.
DO NOT REPRINT
© FORTINET
Blue Team Plan of Action: Playbooks
Fabric View > Automation > Playbook
Playbook configured to
List of playbooks created detect a spearphishing
by the blue team to event
detect attacks, and to
quarantine and release
hosts
This slide shows all the playbooks that the blue team configures in response to the threat report about the
Group ABC attack. These include a playbook that will run if FortiAnalyzer detects a reconnaissance tactic
attempting to gather victim identity information through SMTP enumeration, as well a playbook that will trigger
if FortiAnalyzer detects a spearphishing event. The list of playbooks also include quarantine and unquarantine
playbooks that FortiAnalyzer will run using the FortiClient EMS connector during the containment and
recovery phases of incident handling.
The slide shows an example of the blue team’s spearphishing attack playbook.
DO NOT REPRINT
© FORTINET
Blue Team Plan of Action: Playbooks (Cont)
Fabric View > Automation > Playbook
This slide shows all the playbooks that were run on FortiAnalyzer during the Group ABC attack. This includes
playbooks that were run to identify the SMTP enumeration attempts to gather victim identity information. A
playbook was also run when a spearphishing attachment was detected by FortiSandbox.
The slide also shows the quarantine and unquarantine playbooks that were run using the FortiClient EMS
connector to quarantine the infected host and then later to remove the sanitized host from quarantine.
It also includes the incident that was automatically generated when the spearphishing playbook was run to
monitor the attack. The incident audit history shows the timeline of every action that was performed on this
incident.
DO NOT REPRINT
© FORTINET
Knowledge Check
1. How many days of playbook execution does the playbook dashboard track?
A. 7
B. 15
2. When exporting playbooks, which connector configuration can you also export?
A. Local connector
B. FortiClient EMS connector
DO NOT REPRINT
© FORTINET
Lesson Progress
Playbook Concepts
Creating Playbooks
Configuring Connectors
Managing Playbooks
Now, you will review the objectives that you covered in this lesson.
DO NOT REPRINT
© FORTINET
Review
Identify playbook components
Describe trigger types and their properties
Create and customize playbooks from a template
Create new playbooks from scratch
Use variables in tasks
Configure connector actions
Monitor playbooks
Export and import playbooks
This slide shows the objectives that you covered in this lesson.
By mastering the objectives covered in this lesson, you leaned how to configure and use playbooks effectively
to automate tasks in FortiAnalyzer. You also learned how to use connectors along with playbooks to send
actions to other Fortinet devices and third-party applications.
No part of this publication may be reproduced in any form or by any means or used to make any
derivative such as translation, transformation, or adaptation without permission from Fortinet Inc.,
as stipulated by the United States Copyright Act of 1976.
Copyright© 2024 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet,
Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company
names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and
actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein
represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written
contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified
performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For
absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any
commitment related to future deliverables, features, or development, and circumstances may change such that any forward-looking statements herein are not accurate.
Fortinet disclaims in full any covenants, representations,and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify,
transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.