Fortinet Sample Assessment Report
Fortinet Sample Assessment Report
Assessment Report
Vital Statistics
This document provides the findings of a recent analysis of your infrastructure. The document
represents a summary of these findings and presents a set of recommendations for addressing the
detected events. The analysis is based on data collected using the characteristics below:
Company Details
Company Name: ABC Corporation
Location: Santa Clara, CA
Industry: Technology
Company Size: 5,500 Employees
Test Details
Test Start Date: 3/20/2015 Test Duration: 7 Days
FortiGate Model: FortiGate-300D FortiOS Firmware: 5.2.2
Network Analyzed: Internal LAN Functions Enabled: IPS / AV / Web / App Ctrl
During this assessment, traffic was monitored as it moved over the wire and logs were recorded. These logs are typically
categorized by their log type. While traffic logs record much of the session information flowing across your network, Fortinet can
also monitor more in-depth security logging, such as IPS, anti-virus, web and application control. This assessment was created
based on telemetry from all log types and is meant to provide a big picture view of your network's activity. Used in conjunction
with FortiAnalyzer, FortiGates can provide additional functions such as event management (e.g. alerts when malicious activity is
detected), FortiView analytics and filtering (e.g. investigating specific user activity) and advanced reporting (e.g. detailed reports
on security, user and even wireless activity).
Last year, over 780 enterprises were breached as a result of poor internal security practices and latent vendor content security.
The average cost of a corporate security breach is estimated at $3.5 million USD and is rising at 15% year over year. Intrusions,
malware/botnets and malicious applications collectively comprise a massive risk to your enterprise network. These attack
mechanisms can give attackers access to your most sensitive files and database information. FortiGuard Labs mitigates these
risks by providing award-winning content security and is consistently rated among industry leaders by objective third parties
such as NSS Labs, VB 100 and AV Comparatives.
User application usage and browsing habits can not only be indicative of inefficient use of corporate resources, but can also
indicate a lack of proper enforcement of corporate usage policies. Most enterprises recognize that personal use of corporate
resources is acceptable. But there are many grey areas that businesses must keep a close eye on including: use of proxy
avoidance/peer to peer applications, inappropriate web browsing, phishing websites, and potentially illegal activity. All of which
expose the company to undue liability and potential damages. With over 5,800 application control rules and 250 million
categorized websites, FortiGuard Labs provides telemetry that FortiOS uses to keep your business running effectively.
Performance effectiveness is an often undervalued aspect of security devices, but firewalls must keep up with the line speeds
that today’s next generation switches operate at. A recent survey by Infonetics indicates that 77% of decision-makers at large
organizations feel that they must upgrade their network security performance (100+ Gbps aggregate throughput) in the coming
year. FortiGates leverage FortiASICs to accelerate CPU intensive functions such as packet forwarding and pattern matching.
This offloading typically results in a 5-10X performance increase when measured against competitive solutions.
Evasive Applications ( 42 )
Proxy applications are often used to conceal their activity and bypass the security control. This represents both business and
security risks to your organization. Implement the application policies to dictate the use of these applications.
Deploy a Fortinet Next Generation Firewall to Ensure Application Visibility and Control
Fortinet next-generation firewalls enable organizations to gain visibility on all application traffic and deliver scalable and secure
application control for enterprises. Deploying a Fortinet firewall in your organization and creating secure application policies to
ensure that your network is being used according to the organization’s priorities.
Botnets Detected
A bot is malicious software that invades your computer. Bots allow criminals to remotely control computer systems and execute
illegal activities without user’s awareness. These activities can include: stealing data, spreading spam, distributing malware,
participating in Denial of Service attacks and more. Bots are often used as tools in targeted attacks known as Advanced
Persistent Threats (APTs). A botnet is a collection of such compromised computer systems.
Figure 4: Top Botnets attempting to communicate with Command and Control hosts
Figure 5: These devices should be audited for malware and IPS susceptibility
Understanding application subcategories can give invaluable insights into how efficiently your corporate network is operating.
Certain application types (such as P2P or gaming applications) are not necessarily conducive to corporate environments and
can be blocked or limited in their scope. Other applications may have dual purpose uses (such as instant messenger or social
media apps) and can be managed accordingly. These charts illustrate application categories sorted by the amount of bandwidth
they used during the discovery period.
In today’s network environments, many applications leverage HTTP for communications – even some you wouldn’t normally
expect. The primary benefit of HTTP is that communication is ubiquitous, universally accepted and (generally) open on most
firewalls. For most business-related and whitelisted applications this typically augments communication, but some non-business
applications also use HTTP in either unproductive or potentially nefarious ways.
Websites browsed are strong indicators of how employees utilizing corporate resources and how applications communicate
with specific websites. Analyzing domains accessed can lead to changes in corporate infrastructure such as website blocking,
deep application inspection of cloud-based apps and implementation of web traffic acceleration technologies.
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Session averages on a a daily basis are useful for calculating throughput and proper sizing. It can help when determining peak
planning as a typical enterprise will see more sessions being generated in the morning when the network is at its most active.
1K
800
600
400
200
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Similarly, memory usage over time is an indicator of the FortiGate's sustainability in the target network environment. memory
usage may remain high even when throughput is relatively low due to logging activity (or queued logging activity) over time.
75
60
45
30
15
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
AntiVirus
The FortiGuard AntiVirus Service provides fully automated updates to ensure protection against the latest content level threats.
It employs advanced virus, spyware, and heuristic detection engines to enable FortiGate, FortiMail, and FortiWiFi appliances, and
FortiClient end point security agents, to prevent both new and evolving threats from gaining access to your network and its
valuable content and applications.
AntiSpam
The FortiGuard AntiSpam Service uses both a sender IP reputation database and a spam signature database, along with
sophisticated spam filtering tools on Fortinet appliances and agents, to detect and block a wide range of spam messages.
Application Control
Application Control protects managed desktops and servers by allowing or denying network application usage based on policies
established by the network administrator. Enterprise applications, databases, web mail, social networking applications, IM/P2P,
and file transfer protocols can all be identified accurately by sophisticated detection signatures. Application Control signature
updates are provided via the global FortiGuard distribution network.
Intrusion Prevention
The FortiGuard Intrusion Prevention Service provides Fortinet customers with the latest defenses against stealthy network-level
threats. It uses a customizable database of more than 5,100 known threats to enable FortiGate and FortiWiFi appliances to stop
attacks that evade conventional firewall defenses. It also provides behavior-based heuristics, enabling the system to recognize
threats for which no signature has yet been developed. The combination of known and unknown threat prevention enables
FortiGate systems to stop the most damaging attacks at the network border regardless of whether the network is wired or
wireless, or whether it is at corporate headquarters or a branch office.
IP Reputation
The FortiGuard IP Reputation Service aggregates data from locations and sources around the world that collaborate to provide
up to date information about threatening sources. With breaking intelligence from distributed network gateways combined with
world class research done from FortiGuard Labs, organizations can stay up to date and proactively block attacks.
Web Filtering
Web Filtering Service provides URL filtering to block access to harmful, inappropriate, and dangerous websites that may contain
phishing/pharming attacks, malware such as spyware, or objectionable content that can expose organizations to legal liability.
Based on automatic research tools and targeted research analysis, real-time updates enable you to apply highly-granular
policies that filter web access based on more than 75 web content categories, and more than 47 million rated websites - all
continuously updated via the FortiGuard Network.