Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
52 views28 pages

FortiNAC 09 Security Automation

The document outlines FortiNAC version 8.2, focusing on security automation and orchestration, including objectives such as configuring security device integration and creating admin scans. It details the processes for incident response, security rules, and the creation of alerts and alarms based on security events. Additionally, it covers the configuration of admin scans for marking hosts at risk and policy enforcement.

Uploaded by

abir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views28 pages

FortiNAC 09 Security Automation

The document outlines FortiNAC version 8.2, focusing on security automation and orchestration, including objectives such as configuring security device integration and creating admin scans. It details the processes for incident response, security rules, and the creation of alerts and alarms based on security events. Additionally, it covers the configuration of admin scans for marking hosts at risk and policy enforcement.

Uploaded by

abir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

FortiNAC

Security Automation

Version 8.2

© Copyright Fortinet Inc. All rights reserved. Last Modified: 8 July 2022
Lesson Overview

Security Automation

Admin Scans

2
Security Automation
Objectives
• Understand security automation
• Configure security device integration
• Configure security rules
• Create and use admin scans
Security Automation & Orchestration

4
Security Automation & Orchestration

Log to SIEM

Action
Visibility

TRUSTED TRUSTED

5
Example SOC Workflow

SOC CONTEXT

LIVE INVENTORY OF
NETWORK CONNECTIONS
(LINC)

Rules INCIDENT ANALYSIS

Context
Visibility
and
Automation

6
Alert and Contextual Information
Security Alert Host Information User Information

TRUSTED TRUSTED

Field Value
Field Value Field Value
Vendor Fortinet
Host Name Johns PC First Name John
Type Threat

Operating System Windows 10 Last Name Doe


Sub Type Virus

Threat ID

Description
32423

http Non RFC-


+ Adapter Physical
Address

IP Address
00:01:02:04:04:05

192.168.102.6
+ Role

Email
Contractor

[email protected]
Compliant
Response Fround
Location Switch-2 Port 8 Phone 603 717-XXXX
Severity Critical
IP Address 192.168.102.53 Role Engineering
IP Address 192.168.102.53 Contractor

7
Alert with Contextual Information
Security Alert Security Alert

SIEM
Field Value
First Name John
Security Alert
Last Name Doe

Role Contractor

Email [email protected]

Phone 603 717-XXXX

Role Engineering Contractor


TRUSTED

SIEM Host Name Johns PC

Field Value Operating System Windows 10

Vendor Fortinet Adapter Physical 00:01:02:04:04:05


Address

Type Threat IP Address 192.168.102.53

Location Switch-2 Port 8


Sub Type Virus
Vendor Fortinet

Threat ID 32423 Type Threat

Sub Type Virus


Description http Non RFC-
Compliant Response TRUSTED Threat ID 32423
Fround
Description http Non RFC-
Severity Critical Compliant Response
Fround

IP Address 192.168.102.53 Severity Critical

8
Security – Accelerate Incident Response
Security Rules
Automated Response

Containment

Expanded Notification
Trouble Tickets

Classified False Positives

Possible False Positives


Identified for Further Analysis
Initial Analysis

Log to SIEM

9
FortiNAC Security Rule Correlation Engine
Security Process Matches Yes Create Security
Done

Alert Alert Filter? Event


No

Exit
Security Filter

Evaluate Trigger User/Host


Yes Yes Create Security
Security Satisfied? Profile
Alarm
Rules Satisfied?
No No

Triggers and Profiles Exit Exit

Evaluate Alarm Yes Action Yes Execute


Action Action? Automatic? Activities
No No

Exit Exit
Security Action

10
Security Rule Components
• Filter is criteria of a Security Alert
o Normalized data fields
o Alert attribute value(s)
o True when criteria is matched
• Trigger is a set of Filters
o All or Any (1 to N)
o Time occurrence window
o True when all Filter(s) criteria is matched
• Activity is a FortiNAC task to execute
o Time based undo capability
• Action is 1 to N Activities
o Activity failure handling
o Time based secondary task(s)

11
Security Rule
• A Security Rule is a Trigger combined with:
o Profile – None, Match or Not Matched
o Action – Automatic or Manual
o Notification when Rule matched and/or Action taken
• Rules are evaluated in prioritized order
• A matched Filter results in Security Event creation
• Satisfied Rule results in Security Alarm creation
PoisonDNS Security Rule
Name Trigger Profile Action Notification
PoisonDNS PoisonDNS-Alert None Isolate Host Email Helpdesk

PoisonDNS Security Trigger


Source Security Alert Criteria

FortiGate Alert Type = THREAT, Event Description = Poison DNS Request Traffic(14875), Col[35] = critical

12
Security Events and Alarms
• Security Event is created on a Filter match
o Date and Time
o Source IP and MAC
o Alert attributes
Event Date Source IP Source MAC Alert Attributes
01/12/17 09:48 AM 192.168.5.95 00:1D:09:11:21:DA Alert Type, Subtype, Severity, Threat ID, Event Description, Location

• Security Alarm is created on a Security Rule match


o Date and Time
o Matched Rule
o Action
o Security Events
o Activities Taken
Host MAC Alarm Date Matched Rule Action
00:1D:09:11:21:DA 01/12/17 09:48 AM PoisonDNS Isolate Host

13
Security Rules

14
Security Trigger

Filters

15
User/Host Profile

16
Security Action

Activities

17
Security Events

18
Security Events

19
Security Trigger

20
Security Alarms

21
Security Device Integration
• Creation of new Syslog message mappings
• Customized security device integrations
• Incorporate new security devices into Security Rule development

22
Security Event Parsers (System  Settings)

23
Admin Scans
Objectives
• Understand how to create and use admin scans
Admin Scans
• Mark Hosts At-Risk
o Manual
o Automatic
• Customized Web Page Presentation
o AUP Violation
o Isolation Page (i.e. Dead End)
o Policy Enforcement (No NATing Devices)

25
Admin Scan Configuration (Policy  Remediation Configuration)
Policy

26
Admin Scan Configuration

27

You might also like