FortiSIEM: Log Processing and Search Operators

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What data does FortiSIEM process from received logs?

  • Every log it receives, whether pulled or collected, security or performance information (correct)
  • Only security information
  • Only performance information
  • Only pulled logs

Which of the following tasks is NOT part of FortiSIEM log processing?

  • Encrypting the data (correct)
  • Enriching other attributes
  • Populating event attributes
  • Parsing the data

Which structured search operator expects you to provide a single value for comparison?

  • = (correct)
  • BETWEEN
  • CONTAINS
  • IN

Which structured search operator is used to identify the presence of a specific keyword within an attribute's value?

<p>CONTAINS (A)</p>
Signup and view all the answers

Which structured search operator should be used to find attribute values that fall within a defined range?

<p>BETWEEN (D)</p>
Signup and view all the answers

Which operator should you use in a structured search to verify that a specific attribute has no assigned value?

<p>IS [NULL] (A)</p>
Signup and view all the answers

Structured search operators REGEX and NOT REGEX are designed to match values based on what criteria?

<p>Regular expression patterns (B)</p>
Signup and view all the answers

When using CMDB groups in structured searches, which operators are specifically designed to allow this functionality?

<p>EQUAL TO, NOT EQUAL TO, IN, and NOT IN (C)</p>
Signup and view all the answers

In the context of FortiSIEM, how are Watch Lists best described?

<p>Containers of similar items that can be referenced in searches, rules, and reports (A)</p>
Signup and view all the answers

By what methods can Watch Lists be populated with data?

<p>Dynamically by triggered rules or manually (C)</p>
Signup and view all the answers

Watch Lists include a specific field that allows you to schedule when items expire. What is this field called?

<p>Expiry (C)</p>
Signup and view all the answers

To enable users to query operating system information in a structured manner, FortiSIEM integrates with which component?

<p>Osquery (C)</p>
Signup and view all the answers

What accurately describes a nested query, also known as a subquery, within FortiSIEM analytics?

<p>A query embedded within another query (B)</p>
Signup and view all the answers

When executing a nested query, what determines the order in which the queries are processed?

<p>The inner query (subquery) (A)</p>
Signup and view all the answers

What types of queries can be used when constructing nested queries?

<p>Event queries or CMDB queries (C)</p>
Signup and view all the answers

Which specific scenario is highlighted as a practical application for nested queries involving the correlation of logon events?

<p>Correlating failed and successful logons from the same source IP (B)</p>
Signup and view all the answers

What are the three primary types of rules recognized within FortiSIEM?

<p>Event-based, Baseline, UEBA (A)</p>
Signup and view all the answers

Rules in FortiSIEM actively monitor events and trigger incidents based on which types of system issues?

<p>Security, performance, and availability issues (C)</p>
Signup and view all the answers

What structural components do rules consist of that enable the tracking of events over a defined period and are assessed in real time?

<p>Subpatterns (C)</p>
Signup and view all the answers

Which specific process is tasked with the parallel evaluation of rule data within FortiSIEM's architecture?

<p>phRuleWorker (C)</p>
Signup and view all the answers

How frequently does the phRuleWorker process conduct its evaluation of rule data?

<p>Every 30 seconds (B)</p>
Signup and view all the answers

When setting up a rule action to generate an incident, what types of data can be selected from matching subpattern events to populate the incident details?

<p>Event attributes and aggregations (B)</p>
Signup and view all the answers

What primary function do aggregate functions serve within subpattern conditions?

<p>To perform calculations on matching data and return a single result (A)</p>
Signup and view all the answers

Which logical operators are available for defining conditions when working with multiple subpatterns?

<p>AND, OR, NOT (C)</p>
Signup and view all the answers

If a subpattern occurs multiple times within a defined rule time window, which setting determines how many events must match the subpattern to trigger a rule?

<p>Aggregate function (D)</p>
Signup and view all the answers

Which term describes the method to trigger an incident once several matches are found rather than one single event?

<p>Aggregation (A)</p>
Signup and view all the answers

Suppose you need to aggregate events based on source IP and calculate the average bytes transferred. Which setting would also have to be configured to achieve this goal?

<p>Group By attributes (A)</p>
Signup and view all the answers

What is the purpose of the 'Group By' functionality when used in conjunction with aggregate functions?

<p>To define the scope of the aggregation calculation. (C)</p>
Signup and view all the answers

You're creating a rule from an analytics search to count the number of matched events. Which aggregate function should you select?

<p>COUNT(Matched Events) (C)</p>
Signup and view all the answers

What setting determines the number of event matches needed for a rule to trigger an incident?

<p>Aggregate Condition (C)</p>
Signup and view all the answers

What type of rule is designed to assess whether a single condition has been met?

<p>Single subpattern rule (C)</p>
Signup and view all the answers

What is the main purpose of defining relationships between multiple subpatterns within a rule?

<p>To correlate events using shared attributes between subpatterns and reduce false positives (A)</p>
Signup and view all the answers

When defining conditions for a multiple subpattern rule, what configuration is essential if more than one subpattern is in use?

<p>A relationship (A)</p>
Signup and view all the answers

When considering the rule time window for a subpattern, what factor should be taken into account because matching events are temporarily stored in memory?

<p>How many matching events occur (D)</p>
Signup and view all the answers

When rules are created from analytics searches, how does FortiSIEM utilize the search's filter conditions in constructing the rule subpattern?

<p>Filter conditions (C)</p>
Signup and view all the answers

Where are 'group by' attributes defined in a subpattern to ensure their presence in the incident source, target, or detail?

<p>In the Group by attributes (B)</p>
Signup and view all the answers

How does FortiSIEM handle the collection of performance metrics from devices with multiple components, such as disks or interfaces?

<p>Each component (disk, interface) produces a unique event. (A)</p>
Signup and view all the answers

When a performance message is collected, what does it map to within FortiSIEM?

<p>An event type (D)</p>
Signup and view all the answers

Why is the practice of setting static, hard-coded thresholds for performance metrics on a per-device or global basis often considered tedious?

<p>They require manual tuning of the system. (C)</p>
Signup and view all the answers

For its baseline calculations, FortiSIEM divides time into which distinct periods?

<p>Hours of the weekdays and weekends (D)</p>
Signup and view all the answers

Regarding baselines, what term describes the storage units for specific baseline data, which are summarized hourly by the supervisor?

<p>Hourly buckets (B)</p>
Signup and view all the answers

How frequently does the supervisor summarize the data and store baseline information within the SQLite database?

<p>Every hour (D)</p>
Signup and view all the answers

In the phoenix_config.txt, what does the value defined for 'Num Points Relevance in Rules' determine regarding baseline rules?

<p>The minimum number of data points required before baseline rules are triggered (A)</p>
Signup and view all the answers

What is the expression $2*STAT_AVG(AVG(Memory Util):109) in a baseline rule designed to do?

<p>Trigger if current average memory utilization is 100% (2 times) more than the statistical average. (C)</p>
Signup and view all the answers

According to the content, what specific data point cannot be displayed in an incident detail that is triggered by a baseline rule?

<p>The statistical average of matching events (C)</p>
Signup and view all the answers

Flashcards

FortiSIEM Log Processing

Processes every log, whether pulled or collected, security or performance information.

FortiSIEM Log Processing Steps

Parsing data, populating event attributes, enriching attributes.

Structured Search Operator "="

A single value to match.

Structured Search Operator CONTAINS

Search for the presence of a keyword in an attribute.

Signup and view all the flashcards

Structured Search Operator BETWEEN

Search for attribute values within a specified range.

Signup and view all the flashcards

Structured Search Operator IS [NULL]

Check if an attribute has no value.

Signup and view all the flashcards

REGEX, NOT REGEX Operators

Match values based on regular expression patterns.

Signup and view all the flashcards

Operators for CMDB groups in searches

EQUAL TO, NOT EQUAL TO, IN, and NOT IN

Signup and view all the flashcards

Watch Lists

Containers of similar items that can be referenced in searches, rules, and reports.

Signup and view all the flashcards

Watch Lists Population

Dynamically by triggered rules or manually.

Signup and view all the flashcards

Watch List Field for Time Management

Expiry

Signup and view all the flashcards

FortiSIEM Integration for OS Info

Osquery

Signup and view all the flashcards

Nested Query

A query embedded within another query.

Signup and view all the flashcards

Nested Query Execution Order

The inner query (subquery)

Signup and view all the flashcards

Types of Nested Queries

Event queries or CMDB queries

Signup and view all the flashcards

Nested Query Use Case for Logons

Correlating failed and successful logons from the same source IP.

Signup and view all the flashcards

Three Types of Rules in FortiSIEM

Event-based, Baseline, UEBA.

Signup and view all the flashcards

Rule Trigger Issues in FortiSIEM

Security, performance, and availability issues.

Signup and view all the flashcards

Rules Component that Tracks Events

Subpatterns

Signup and view all the flashcards

Rule Data Evaluation Process

phRuleWorker

Signup and view all the flashcards

phRuleWorker Evaluation Frequency

Every 30 seconds

Signup and view all the flashcards

Incident Details Population

Event attributes and aggregations

Signup and view all the flashcards

Purpose of Aggregate Functions

To perform calculations on matching data and return a single result

Signup and view all the flashcards

Logical Operators

AND, OR

Signup and view all the flashcards

Purpose of a Filter

Filters out unwanted noise.

Signup and view all the flashcards

Creating Unique Events in Subpatterns

Group By

Signup and view all the flashcards

Events Grouping Consideration

Time Window

Signup and view all the flashcards

Most Used Aggregate Function

COUNT(Matched Events)

Signup and view all the flashcards

Defines Event Matches

Aggregate Condition

Signup and view all the flashcards

Rule for Single Condition

Single subpattern rule

Signup and view all the flashcards

Defining Relationship Between Subpatterns

To correlate events using shared attributes between subpatterns and reduce false positives

Signup and view all the flashcards

Multiple Subpattern Rule Conditions

A relationship

Signup and view all the flashcards

Rule Time Window: key Consideration

How many matching events occur

Signup and view all the flashcards

Analytics Search Filter Conditions Usage

Filter conditions

Signup and view all the flashcards

Defining Subpattern Attributes

In the Group by attributes

Signup and view all the flashcards

FortiSIEM Handling of Performance Metrics

Each component (disk, interface) produces a unique event.

Signup and view all the flashcards

Mapping Performance Messages

An event type

Signup and view all the flashcards

Issue with Hard-Coded Thresholds

They require manual tuning of the system.

Signup and view all the flashcards

Distinct Baseline Time Periods

Hours of the weekdays and weekends

Signup and view all the flashcards

Data Storage for Specific Baselines

Hourly buckets

Signup and view all the flashcards

Study Notes

  • FortiSIEM processes every log it receives including pulled or collected, security or performance information.

FortiSIEM Log Processing

  • Log processing includes parsing data, populating event attributes, and enriching other attributes.
  • Log processing does not include encrypting the data.

Structured Search Operators

  • The "=" operator expects a single value.
  • The "CONTAINS" operator searches for the presence of a keyword in an attribute.
  • The "BETWEEN" operator searches for attribute values within a specified range.
  • The "IS [NULL]" operator checks if an attribute has no value.
  • The "REGEX" and "NOT REGEX" operators match values based on regular expression patterns.
  • Operators like "EQUAL TO", "NOT EQUAL TO", "IN", and "NOT IN" allow referencing CMDB groups in structured searches.

Watch Lists

  • Watch Lists are containers of similar items referenced in searches, rules, and reports.
  • Watch Lists can be populated dynamically by triggered rules or manually.
  • Watch Lists have an expiry field that can be set to a specific date or "Never expires".

FortiSIEM Integrations

  • FortiSIEM integrates with Osquery to allow users to query operating system information in a structured format.

Nested Queries

  • A nested query (or subquery) is a query embedded within another query.
  • In a nested query, the inner query (subquery) runs first.
  • Nested queries can be event queries or CMDB queries.
  • A use case for nested queries involves correlating failed and successful logons from the same source IP.

Rule Types

  • The three types of rules in FortiSIEM mentioned are event-based, baseline, and UEBA.
  • Rules in FortiSIEM track events to trigger incidents based on security, performance, and availability issues.
  • Rules are composed of subpatterns that track events over a specified time window and are evaluated in memory.
  • The phRuleWorker process evaluates rule data in parallel in FortiSIEM.
  • The phRuleWorker process evaluates rule data every 30 seconds.
  • When defining a rule action to generate an incident, event attributes and aggregations can be selected from matching subpattern events to populate incident details.
  • Aggregate functions in subpattern conditions perform calculations on matching data and return a single result.
  • Logical operators like AND, OR, NOT are used for defining conditions with multiple subpatterns.
  • When creating rules from analytics searches, COUNT(Matched Events) can be selected as the aggregate function to count the number of events.
  • Aggregate Condition defines the number of event matches required for a rule to trigger.
  • A single subpattern rule is constructed to evaluate a single condition that has occurred.
  • Defining a relationship between multiple subpatterns in a rule correlates events using shared attributes between subpatterns and reduces false positives.
  • When defining conditions for a multiple subpattern rule, a relationship must be defined if multiple subpatterns are used.
  • How many matching events occur should be considered when defining the rule time window for a subpattern because the matching events are kept in memory.
  • When creating rules from analytics searches, FortiSIEM uses the analytics search filter conditions to create the rule subpattern filter conditions.
  • The group by attributes are defined in a subpattern that you want to have present in the incident source, target, or detail are the Group by attributes.

Performance Metrics

  • FortiSIEM handles collecting performance metrics from a device with multiple components, like a server by ensuring each component (disk, interface) produces a unique event.
  • Each performance message is mapped to an event type.
  • Setting static hard-coded thresholds for performance metrics per device or globally is a tedious process because it requires manual tuning of the system.
  • FortiSIEM builds distinct baselines for hours of the weekdays and weekends.
  • Hourly buckets are used to store data for specific baselines, summarized every hour by the supervisor.
  • The supervisor summarizes results and stores baseline data in the SQLite database every hour.
  • The value defined in the phoenix_config.txt file for 'Num Points Relevance in Rules' determines the minimum number of data points required before baseline rules are triggered.
  • The expression 2*STAT_AVG(AVG(Memory Util):109) in a baseline rule means trigger if current average memory utilization is 100% (2 times) more than the statistical average.
  • The statistical average of matching events cannot be displayed in an incident detail based on a baseline rule trigger.

Incident Handling

  • According to NIST SP 800-61, incident handling is defined as a lifecycle with four phases.
  • The MITRE ATT&CK framework is a detailed mapping of adversary behavior framework used for threat intelligence and classification.
  • The MITRE ATT&CK framework consists of 14 tactics categories, described as "technical objectives" of an adversary.
  • The four categories of incidents mentioned in the context of FortiSIEM's Incidents dashboard are Security, Performance, Availability, and Change.
  • The MITRE ATT&CK dashboard view classifies security events detected by FortiSIEM into MITRE ATT&CK categories.
  • The primary purpose of the Incident List view in FortiSIEM is to enable users to search incidents and take actions.
  • The purpose of the Incident Name option when refining the incident List view is to condense incidents into single rows with a count to reduce noise and understand occurrences.
  • An incident achieves the 'Auto Cleared' status when a clear condition defined for the rule is met.
  • For performance and availability incidents, if an incident is not triggered again within 24 hours, the system may change the status to 'System Cleared' to conserve system memory, the 24-hour period can be extended using a back-end configuration file.
  • The purpose of the mitigation library in FortiSIEM is to provide pre-built remediation scripts to take action on devices in response to incidents.
  • Besides using the provided remediation scripts, users can add scripts to the mitigation library by creating and adding their own scripts from the FortiSIEM GUI.
  • The raw event messages that created the incident can optionally be included when exporting single or multiple incidents as a PDF report.
  • The Risk view on the Incidents tab shows entities (Devices and Users) ordered by risk score.
  • The UEBA incident dashboard shows UEBA incidents created by the AI module based on alerts received from FortiInsight.
  • In the MITRE ATT&CK view, the Rule Coverage view provides an overview of the tactics and techniques that FortiSIEM rules cover.
  • In the MITRE ATT&CK Incident Coverage view, the bolded number under each tactic in the main row header indicates the number of incidents associated with a specific tactic.
  • The MITRE ATT&CK Incident Explorer provides a host-centric, interactive ATT&CK view.
  • When defining a pattern-based clear condition for a rule, association between the clear condition incident attributes and the original rule incident attributes must be defined to ensure the cleared incident is associated with the original rule.

FortiSIEM Remediation

  • FortiSIEM Remediation responds to detected network and security threats and operational device conditions.
  • FortiSIEM records all successful and failed remediation attempts in back-end events, these can be queried using event type PH_INCIDENT_ACTION_STATUS.
  • The system notifies users when an incident is cleared automatically by a rule's clear condition by sending an email with "[Cleared]" in the subject header, provided the automation policy allows clear notifications.
  • The system notifies users when an incident is cleared manually by an operator by sending an email with "[Cleared Manually]" in the subject header, provided the automation policy allows clear notifications.
  • In policy definitions for automation, users can specify whether they want to be notified when an incident is cleared in the incident automation policy.
  • The possible incident status states mentioned, including those related to clearing are Active, Auto Cleared, System Cleared, Cleared Manually.
  • The ability to query operating system information in a structured format using osquery allows users to check specific security configurations like the status of Windows command-line auditing, this is shown in the sources by checking the registry for a specific key value.
  • In the CMDB Lookups and Filters lesson objectives, referencing the CMDB data in structured searches is listed as something you should be able to do after completing the section.
  • Structured search allows you to filter data in a structured way using operators.
  • When creating a rule from an analytics search, the analytics search display conditions are used to create the rule Group by conditions.
  • "OR" is the Boolean operator that should be used between two conditions checking if the Reporting IP equals one specific value OR another specific value.
  • "IS" is the operator that must be used in a search condition Attribute: User Operator: ? Value: NULL.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

FortiSIEM for MSSPs
20 questions

FortiSIEM for MSSPs

VisionarySugilite avatar
VisionarySugilite
Use Quizgecko on...
Browser
Browser