Podcast
Questions and Answers
What data does FortiSIEM process from received logs?
What data does FortiSIEM process from received logs?
- Every log it receives, whether pulled or collected, security or performance information (correct)
- Only security information
- Only performance information
- Only pulled logs
Which of the following tasks is NOT part of FortiSIEM log processing?
Which of the following tasks is NOT part of FortiSIEM log processing?
- Encrypting the data (correct)
- Enriching other attributes
- Populating event attributes
- Parsing the data
Which structured search operator expects you to provide a single value for comparison?
Which structured search operator expects you to provide a single value for comparison?
- = (correct)
- BETWEEN
- CONTAINS
- IN
Which structured search operator is used to identify the presence of a specific keyword within an attribute's value?
Which structured search operator is used to identify the presence of a specific keyword within an attribute's value?
Which structured search operator should be used to find attribute values that fall within a defined range?
Which structured search operator should be used to find attribute values that fall within a defined range?
Which operator should you use in a structured search to verify that a specific attribute has no assigned value?
Which operator should you use in a structured search to verify that a specific attribute has no assigned value?
Structured search operators REGEX and NOT REGEX are designed to match values based on what criteria?
Structured search operators REGEX and NOT REGEX are designed to match values based on what criteria?
When using CMDB groups in structured searches, which operators are specifically designed to allow this functionality?
When using CMDB groups in structured searches, which operators are specifically designed to allow this functionality?
In the context of FortiSIEM, how are Watch Lists best described?
In the context of FortiSIEM, how are Watch Lists best described?
By what methods can Watch Lists be populated with data?
By what methods can Watch Lists be populated with data?
Watch Lists include a specific field that allows you to schedule when items expire. What is this field called?
Watch Lists include a specific field that allows you to schedule when items expire. What is this field called?
To enable users to query operating system information in a structured manner, FortiSIEM integrates with which component?
To enable users to query operating system information in a structured manner, FortiSIEM integrates with which component?
What accurately describes a nested query, also known as a subquery, within FortiSIEM analytics?
What accurately describes a nested query, also known as a subquery, within FortiSIEM analytics?
When executing a nested query, what determines the order in which the queries are processed?
When executing a nested query, what determines the order in which the queries are processed?
What types of queries can be used when constructing nested queries?
What types of queries can be used when constructing nested queries?
Which specific scenario is highlighted as a practical application for nested queries involving the correlation of logon events?
Which specific scenario is highlighted as a practical application for nested queries involving the correlation of logon events?
What are the three primary types of rules recognized within FortiSIEM?
What are the three primary types of rules recognized within FortiSIEM?
Rules in FortiSIEM actively monitor events and trigger incidents based on which types of system issues?
Rules in FortiSIEM actively monitor events and trigger incidents based on which types of system issues?
What structural components do rules consist of that enable the tracking of events over a defined period and are assessed in real time?
What structural components do rules consist of that enable the tracking of events over a defined period and are assessed in real time?
Which specific process is tasked with the parallel evaluation of rule data within FortiSIEM's architecture?
Which specific process is tasked with the parallel evaluation of rule data within FortiSIEM's architecture?
How frequently does the phRuleWorker process conduct its evaluation of rule data?
How frequently does the phRuleWorker process conduct its evaluation of rule data?
When setting up a rule action to generate an incident, what types of data can be selected from matching subpattern events to populate the incident details?
When setting up a rule action to generate an incident, what types of data can be selected from matching subpattern events to populate the incident details?
What primary function do aggregate functions serve within subpattern conditions?
What primary function do aggregate functions serve within subpattern conditions?
Which logical operators are available for defining conditions when working with multiple subpatterns?
Which logical operators are available for defining conditions when working with multiple subpatterns?
If a subpattern occurs multiple times within a defined rule time window, which setting determines how many events must match the subpattern to trigger a rule?
If a subpattern occurs multiple times within a defined rule time window, which setting determines how many events must match the subpattern to trigger a rule?
Which term describes the method to trigger an incident once several matches are found rather than one single event?
Which term describes the method to trigger an incident once several matches are found rather than one single event?
Suppose you need to aggregate events based on source IP and calculate the average bytes transferred. Which setting would also have to be configured to achieve this goal?
Suppose you need to aggregate events based on source IP and calculate the average bytes transferred. Which setting would also have to be configured to achieve this goal?
What is the purpose of the 'Group By' functionality when used in conjunction with aggregate functions?
What is the purpose of the 'Group By' functionality when used in conjunction with aggregate functions?
You're creating a rule from an analytics search to count the number of matched events. Which aggregate function should you select?
You're creating a rule from an analytics search to count the number of matched events. Which aggregate function should you select?
What setting determines the number of event matches needed for a rule to trigger an incident?
What setting determines the number of event matches needed for a rule to trigger an incident?
What type of rule is designed to assess whether a single condition has been met?
What type of rule is designed to assess whether a single condition has been met?
What is the main purpose of defining relationships between multiple subpatterns within a rule?
What is the main purpose of defining relationships between multiple subpatterns within a rule?
When defining conditions for a multiple subpattern rule, what configuration is essential if more than one subpattern is in use?
When defining conditions for a multiple subpattern rule, what configuration is essential if more than one subpattern is in use?
When considering the rule time window for a subpattern, what factor should be taken into account because matching events are temporarily stored in memory?
When considering the rule time window for a subpattern, what factor should be taken into account because matching events are temporarily stored in memory?
When rules are created from analytics searches, how does FortiSIEM utilize the search's filter conditions in constructing the rule subpattern?
When rules are created from analytics searches, how does FortiSIEM utilize the search's filter conditions in constructing the rule subpattern?
Where are 'group by' attributes defined in a subpattern to ensure their presence in the incident source, target, or detail?
Where are 'group by' attributes defined in a subpattern to ensure their presence in the incident source, target, or detail?
How does FortiSIEM handle the collection of performance metrics from devices with multiple components, such as disks or interfaces?
How does FortiSIEM handle the collection of performance metrics from devices with multiple components, such as disks or interfaces?
When a performance message is collected, what does it map to within FortiSIEM?
When a performance message is collected, what does it map to within FortiSIEM?
Why is the practice of setting static, hard-coded thresholds for performance metrics on a per-device or global basis often considered tedious?
Why is the practice of setting static, hard-coded thresholds for performance metrics on a per-device or global basis often considered tedious?
For its baseline calculations, FortiSIEM divides time into which distinct periods?
For its baseline calculations, FortiSIEM divides time into which distinct periods?
Regarding baselines, what term describes the storage units for specific baseline data, which are summarized hourly by the supervisor?
Regarding baselines, what term describes the storage units for specific baseline data, which are summarized hourly by the supervisor?
How frequently does the supervisor summarize the data and store baseline information within the SQLite database?
How frequently does the supervisor summarize the data and store baseline information within the SQLite database?
In the phoenix_config.txt, what does the value defined for 'Num Points Relevance in Rules' determine regarding baseline rules?
In the phoenix_config.txt, what does the value defined for 'Num Points Relevance in Rules' determine regarding baseline rules?
What is the expression $2*STAT_AVG(AVG(Memory Util):109)
in a baseline rule designed to do?
What is the expression $2*STAT_AVG(AVG(Memory Util):109)
in a baseline rule designed to do?
According to the content, what specific data point cannot be displayed in an incident detail that is triggered by a baseline rule?
According to the content, what specific data point cannot be displayed in an incident detail that is triggered by a baseline rule?
Flashcards
FortiSIEM Log Processing
FortiSIEM Log Processing
Processes every log, whether pulled or collected, security or performance information.
FortiSIEM Log Processing Steps
FortiSIEM Log Processing Steps
Parsing data, populating event attributes, enriching attributes.
Structured Search Operator "="
Structured Search Operator "="
A single value to match.
Structured Search Operator CONTAINS
Structured Search Operator CONTAINS
Signup and view all the flashcards
Structured Search Operator BETWEEN
Structured Search Operator BETWEEN
Signup and view all the flashcards
Structured Search Operator IS [NULL]
Structured Search Operator IS [NULL]
Signup and view all the flashcards
REGEX, NOT REGEX Operators
REGEX, NOT REGEX Operators
Signup and view all the flashcards
Operators for CMDB groups in searches
Operators for CMDB groups in searches
Signup and view all the flashcards
Watch Lists
Watch Lists
Signup and view all the flashcards
Watch Lists Population
Watch Lists Population
Signup and view all the flashcards
Watch List Field for Time Management
Watch List Field for Time Management
Signup and view all the flashcards
FortiSIEM Integration for OS Info
FortiSIEM Integration for OS Info
Signup and view all the flashcards
Nested Query
Nested Query
Signup and view all the flashcards
Nested Query Execution Order
Nested Query Execution Order
Signup and view all the flashcards
Types of Nested Queries
Types of Nested Queries
Signup and view all the flashcards
Nested Query Use Case for Logons
Nested Query Use Case for Logons
Signup and view all the flashcards
Three Types of Rules in FortiSIEM
Three Types of Rules in FortiSIEM
Signup and view all the flashcards
Rule Trigger Issues in FortiSIEM
Rule Trigger Issues in FortiSIEM
Signup and view all the flashcards
Rules Component that Tracks Events
Rules Component that Tracks Events
Signup and view all the flashcards
Rule Data Evaluation Process
Rule Data Evaluation Process
Signup and view all the flashcards
phRuleWorker Evaluation Frequency
phRuleWorker Evaluation Frequency
Signup and view all the flashcards
Incident Details Population
Incident Details Population
Signup and view all the flashcards
Purpose of Aggregate Functions
Purpose of Aggregate Functions
Signup and view all the flashcards
Logical Operators
Logical Operators
Signup and view all the flashcards
Purpose of a Filter
Purpose of a Filter
Signup and view all the flashcards
Creating Unique Events in Subpatterns
Creating Unique Events in Subpatterns
Signup and view all the flashcards
Events Grouping Consideration
Events Grouping Consideration
Signup and view all the flashcards
Most Used Aggregate Function
Most Used Aggregate Function
Signup and view all the flashcards
Defines Event Matches
Defines Event Matches
Signup and view all the flashcards
Rule for Single Condition
Rule for Single Condition
Signup and view all the flashcards
Defining Relationship Between Subpatterns
Defining Relationship Between Subpatterns
Signup and view all the flashcards
Multiple Subpattern Rule Conditions
Multiple Subpattern Rule Conditions
Signup and view all the flashcards
Rule Time Window: key Consideration
Rule Time Window: key Consideration
Signup and view all the flashcards
Analytics Search Filter Conditions Usage
Analytics Search Filter Conditions Usage
Signup and view all the flashcards
Defining Subpattern Attributes
Defining Subpattern Attributes
Signup and view all the flashcards
FortiSIEM Handling of Performance Metrics
FortiSIEM Handling of Performance Metrics
Signup and view all the flashcards
Mapping Performance Messages
Mapping Performance Messages
Signup and view all the flashcards
Issue with Hard-Coded Thresholds
Issue with Hard-Coded Thresholds
Signup and view all the flashcards
Distinct Baseline Time Periods
Distinct Baseline Time Periods
Signup and view all the flashcards
Data Storage for Specific Baselines
Data Storage for Specific Baselines
Signup and view all the flashcards
Study Notes
- FortiSIEM processes every log it receives including pulled or collected, security or performance information.
FortiSIEM Log Processing
- Log processing includes parsing data, populating event attributes, and enriching other attributes.
- Log processing does not include encrypting the data.
Structured Search Operators
- The "=" operator expects a single value.
- The "CONTAINS" operator searches for the presence of a keyword in an attribute.
- The "BETWEEN" operator searches for attribute values within a specified range.
- The "IS [NULL]" operator checks if an attribute has no value.
- The "REGEX" and "NOT REGEX" operators match values based on regular expression patterns.
- Operators like "EQUAL TO", "NOT EQUAL TO", "IN", and "NOT IN" allow referencing CMDB groups in structured searches.
Watch Lists
- Watch Lists are containers of similar items referenced in searches, rules, and reports.
- Watch Lists can be populated dynamically by triggered rules or manually.
- Watch Lists have an expiry field that can be set to a specific date or "Never expires".
FortiSIEM Integrations
- FortiSIEM integrates with Osquery to allow users to query operating system information in a structured format.
Nested Queries
- A nested query (or subquery) is a query embedded within another query.
- In a nested query, the inner query (subquery) runs first.
- Nested queries can be event queries or CMDB queries.
- A use case for nested queries involves correlating failed and successful logons from the same source IP.
Rule Types
- The three types of rules in FortiSIEM mentioned are event-based, baseline, and UEBA.
- Rules in FortiSIEM track events to trigger incidents based on security, performance, and availability issues.
- Rules are composed of subpatterns that track events over a specified time window and are evaluated in memory.
- The phRuleWorker process evaluates rule data in parallel in FortiSIEM.
- The phRuleWorker process evaluates rule data every 30 seconds.
- When defining a rule action to generate an incident, event attributes and aggregations can be selected from matching subpattern events to populate incident details.
- Aggregate functions in subpattern conditions perform calculations on matching data and return a single result.
- Logical operators like AND, OR, NOT are used for defining conditions with multiple subpatterns.
- When creating rules from analytics searches, COUNT(Matched Events) can be selected as the aggregate function to count the number of events.
- Aggregate Condition defines the number of event matches required for a rule to trigger.
- A single subpattern rule is constructed to evaluate a single condition that has occurred.
- Defining a relationship between multiple subpatterns in a rule correlates events using shared attributes between subpatterns and reduces false positives.
- When defining conditions for a multiple subpattern rule, a relationship must be defined if multiple subpatterns are used.
- How many matching events occur should be considered when defining the rule time window for a subpattern because the matching events are kept in memory.
- When creating rules from analytics searches, FortiSIEM uses the analytics search filter conditions to create the rule subpattern filter conditions.
- The group by attributes are defined in a subpattern that you want to have present in the incident source, target, or detail are the Group by attributes.
Performance Metrics
- FortiSIEM handles collecting performance metrics from a device with multiple components, like a server by ensuring each component (disk, interface) produces a unique event.
- Each performance message is mapped to an event type.
- Setting static hard-coded thresholds for performance metrics per device or globally is a tedious process because it requires manual tuning of the system.
- FortiSIEM builds distinct baselines for hours of the weekdays and weekends.
- Hourly buckets are used to store data for specific baselines, summarized every hour by the supervisor.
- The supervisor summarizes results and stores baseline data in the SQLite database every hour.
- The value defined in the phoenix_config.txt file for 'Num Points Relevance in Rules' determines the minimum number of data points required before baseline rules are triggered.
- The expression
2*STAT_AVG(AVG(Memory Util):109)
in a baseline rule means trigger if current average memory utilization is 100% (2 times) more than the statistical average. - The statistical average of matching events cannot be displayed in an incident detail based on a baseline rule trigger.
Incident Handling
- According to NIST SP 800-61, incident handling is defined as a lifecycle with four phases.
- The MITRE ATT&CK framework is a detailed mapping of adversary behavior framework used for threat intelligence and classification.
- The MITRE ATT&CK framework consists of 14 tactics categories, described as "technical objectives" of an adversary.
- The four categories of incidents mentioned in the context of FortiSIEM's Incidents dashboard are Security, Performance, Availability, and Change.
- The MITRE ATT&CK dashboard view classifies security events detected by FortiSIEM into MITRE ATT&CK categories.
- The primary purpose of the Incident List view in FortiSIEM is to enable users to search incidents and take actions.
- The purpose of the Incident Name option when refining the incident List view is to condense incidents into single rows with a count to reduce noise and understand occurrences.
- An incident achieves the 'Auto Cleared' status when a clear condition defined for the rule is met.
- For performance and availability incidents, if an incident is not triggered again within 24 hours, the system may change the status to 'System Cleared' to conserve system memory, the 24-hour period can be extended using a back-end configuration file.
- The purpose of the mitigation library in FortiSIEM is to provide pre-built remediation scripts to take action on devices in response to incidents.
- Besides using the provided remediation scripts, users can add scripts to the mitigation library by creating and adding their own scripts from the FortiSIEM GUI.
- The raw event messages that created the incident can optionally be included when exporting single or multiple incidents as a PDF report.
- The Risk view on the Incidents tab shows entities (Devices and Users) ordered by risk score.
- The UEBA incident dashboard shows UEBA incidents created by the AI module based on alerts received from FortiInsight.
- In the MITRE ATT&CK view, the Rule Coverage view provides an overview of the tactics and techniques that FortiSIEM rules cover.
- In the MITRE ATT&CK Incident Coverage view, the bolded number under each tactic in the main row header indicates the number of incidents associated with a specific tactic.
- The MITRE ATT&CK Incident Explorer provides a host-centric, interactive ATT&CK view.
- When defining a pattern-based clear condition for a rule, association between the clear condition incident attributes and the original rule incident attributes must be defined to ensure the cleared incident is associated with the original rule.
FortiSIEM Remediation
- FortiSIEM Remediation responds to detected network and security threats and operational device conditions.
- FortiSIEM records all successful and failed remediation attempts in back-end events, these can be queried using event type PH_INCIDENT_ACTION_STATUS.
- The system notifies users when an incident is cleared automatically by a rule's clear condition by sending an email with "[Cleared]" in the subject header, provided the automation policy allows clear notifications.
- The system notifies users when an incident is cleared manually by an operator by sending an email with "[Cleared Manually]" in the subject header, provided the automation policy allows clear notifications.
- In policy definitions for automation, users can specify whether they want to be notified when an incident is cleared in the incident automation policy.
- The possible incident status states mentioned, including those related to clearing are Active, Auto Cleared, System Cleared, Cleared Manually.
- The ability to query operating system information in a structured format using osquery allows users to check specific security configurations like the status of Windows command-line auditing, this is shown in the sources by checking the registry for a specific key value.
- In the CMDB Lookups and Filters lesson objectives, referencing the CMDB data in structured searches is listed as something you should be able to do after completing the section.
- Structured search allows you to filter data in a structured way using operators.
- When creating a rule from an analytics search, the analytics search display conditions are used to create the rule Group by conditions.
- "OR" is the Boolean operator that should be used between two conditions checking if the Reporting IP equals one specific value OR another specific value.
- "IS" is the operator that must be used in a search condition
Attribute: User Operator: ? Value: NULL
.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.