Podcast
Questions and Answers
Which tab should you go to in order to add credentials for organizations without collectors?
Which tab should you go to in order to add credentials for organizations without collectors?
Which user type should you be logged in as to add credentials for organizations without collectors?
Which user type should you be logged in as to add credentials for organizations without collectors?
Where can you define discovery definitions for deployment without collectors?
Where can you define discovery definitions for deployment without collectors?
Which user type should you be logged in as to define discovery definitions for deployment without collectors?
Which user type should you be logged in as to define discovery definitions for deployment without collectors?
Signup and view all the answers
In the model without collectors, who performs the discovery?
In the model without collectors, who performs the discovery?
Signup and view all the answers
What should you do to scale a deployment without collectors?
What should you do to scale a deployment without collectors?
Signup and view all the answers
What is the purpose of a load balancer in a deployment without collectors?
What is the purpose of a load balancer in a deployment without collectors?
Signup and view all the answers
What happens to discoveries that do not match an organization IP range in a deployment without collectors?
What happens to discoveries that do not match an organization IP range in a deployment without collectors?
Signup and view all the answers
What is the best practice for naming credentials in a deployment without collectors?
What is the best practice for naming credentials in a deployment without collectors?
Signup and view all the answers
What user type should you be logged in as to perform discovery in a deployment without collectors?
What user type should you be logged in as to perform discovery in a deployment without collectors?
Signup and view all the answers
Which protocols are used for performance monitoring and Windows event log collection in FortiSIEM?
Which protocols are used for performance monitoring and Windows event log collection in FortiSIEM?
Signup and view all the answers
How are events filtered in FortiSIEM to perform analytics?
How are events filtered in FortiSIEM to perform analytics?
Signup and view all the answers
What happens to undefined reporting IP-addresses in FortiSIEM?
What happens to undefined reporting IP-addresses in FortiSIEM?
Signup and view all the answers
What is the purpose of adding more workers to the FortiSIEM cluster?
What is the purpose of adding more workers to the FortiSIEM cluster?
Signup and view all the answers
What happens when an alert is escalated on FortiSOAR?
What happens when an alert is escalated on FortiSOAR?
Signup and view all the answers
What feature in FortiSOAR provides an overview of pending work and enables assignment of tasks?
What feature in FortiSOAR provides an overview of pending work and enables assignment of tasks?
Signup and view all the answers
What determines the accessibility levels of users in FortiSOAR?
What determines the accessibility levels of users in FortiSOAR?
Signup and view all the answers
What can users prioritize by looking at their dashboard in FortiSOAR?
What can users prioritize by looking at their dashboard in FortiSOAR?
Signup and view all the answers
What is the purpose of role-based access control (R-BAC) in FortiSOAR?
What is the purpose of role-based access control (R-BAC) in FortiSOAR?
Signup and view all the answers
What can administrators create throughout the FortiSOAR application?
What can administrators create throughout the FortiSOAR application?
Signup and view all the answers