Fortinet
Communication and Collaboration
Fortinet - Next-gen firewalls and cybersecurity solutions for network security.
Provider: Fortinet
Detection Rule | MITRE Tactic | MITRE Technique | Criticality | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Anomalous Network Traffic | Discovery | Network Service Discovery (T1046) | High | ||||||||
|
|||||||||||
Unauthorized Access Attempts | Initial Access | Brute Force (T1110) | Critical | ||||||||
|
|||||||||||
Malware Detection | Execution | Malicious File Execution (T1203) | Critical | ||||||||
|
|||||||||||
Policy Violations | Defense Evasion | Application Layer Protocol Manipulation (T1502) | Medium | ||||||||
|
|||||||||||
DDoS Attack Detection | Impact | Network Denial of Service (T1498) | Critical | ||||||||
|
|||||||||||
Data Exfiltration | Exfiltration | Exfiltration Over Command and Control Channel (T1041) | High | ||||||||
|
|||||||||||
Internal Reconnaissance | Discovery | Account Discovery (T1087) | Medium | ||||||||
|
|||||||||||
Credential Dumping | Credential Access | Credential Dumping (T1003) | High | ||||||||
|
|||||||||||
Lateral Movement | Lateral Movement | Remote Services (T1021) | High | ||||||||
|
|||||||||||
Command and Control (C2) Activity | Command and Control | Application Layer Protocol (T1071) | Critical | ||||||||
|
APIs and Their Scopes
Detection Rule | API Required | API Scope |
---|---|---|
Anomalous Network Traffic | /api/v2/firewall/logs | read:logs |
Unauthorized Access Attempts | /api/v2/authentication/failures | read:authentication |
Malware Detection | /api/v2/endpoint/detection | read:endpoint |
Policy Violations | /api/v2/user/access | read:access |
DDoS Attack Detection | /api/v2/network/traffic | read:traffic |
Data Exfiltration | /api/v2/data/exfiltration | read:data |
Internal Reconnaissance | /api/v2/user/accounts | read:accounts |
Credential Dumping | /api/v2/credential/access | read:credentials |
Lateral Movement | /api/v2/remote/access | read:remote |
Command and Control (C2) Activity | /api/v2/network/connections | read:connections |
Reports and Widgets for CISO
Report Name | Widgets | Description |
---|---|---|
Executive Summary Report | Total Incidents | High-level overview of overall security posture, including incident trends and compliance metrics. |
Current Threat Level Compliance Status |
||
Incident Response Summary | Incidents by Type | Details incidents handled, including response times and resolutions. |
Average Response Time Resolved vs. Open Incidents |
||
Threat Landscape Report | Top 10 Threats Detected | Overview of threats detected, categorized by type and source. |
Origin of Threats Threats by Severity Level |
||
Policy Compliance Report | Number of Violations by Policy | Analyzes adherence to security policies and identifies violations. |
Policy Violation Trends Top Violators |
||
Network Traffic Analysis Report | Traffic Volume Over Time | Insights into network traffic patterns and anomalies. |
Anomalous Traffic Events Top Talkers (IP Addresses) |
||
User Activity Report | User Logins Over Time | Monitors user behavior and identifies anomalies. |
Suspicious User Activity Top 10 Users by Access Frequency |
||
Vulnerability Assessment Report | Vulnerabilities by Severity | Identifies vulnerabilities within the network and their statuses. |
Patch Status Overview Top Vulnerable Assets |
||
Endpoint Protection Report | Malware Incidents by Endpoint | Summary of endpoint security incidents and status. |
Endpoint Compliance Status Number of Active Agents |
||
DDoS Attack Analysis Report | DDoS Events Over Time | Reviews DDoS attacks and their impact on the organization. |
Traffic Volume During DDoS Sources of DDoS Attacks |
||
Data Exfiltration Report | Data Transfer Volume Over Time | Overview of potential data exfiltration incidents and outcomes. |
Exfiltration Attempts Detected Top Targeted Data |