Fortinet FortiGate Content Pack

The following content pack is available for use with a Graylog Illuminate license and Graylog Enterprise or Graylog Security. Contact sales to learn more about obtaining Illuminate.

Fortinet's FortiGate is a next-generation firewall that covers both traditional and wireless traffic. The hardware-based firewall can function as an IPS and include SSL inspection and web filtering. This technology pack will process FortiGate event log messages, providing normalization and enrichment of common events of interest.

Supported Versions

  • FortiGate running FortiOS Version 7.0 or later.

Requirements

  • Graylog Server with a valid Enterprise license, running Graylog version 4.2.5 or later.

  • Configure FortiGate to transmit Syslog to your Graylog server Syslog input.

Stream Configuration

This technology pack includes 1 stream:

  • Illuminate:Fortigate Messages

Hint: If this stream does not exist prior to the activation of this pack then it will be created and configured to route messages to this stream and the associated index set. There should not be any stream rules configured for this stream.

Index Set Configuration

This technology pack includes 1 index set definition:

  • Fortinet Event Log Messages

Hint: If this index set is already defined, then nothing will be changed. If this index set does not exist, then it will be created with retention settings of a daily rotation and 90 days of retention. These settings can be adjusted as required after installation.

Log Collection

Configure your FortiGate device(s) following the instructions in the Graylog Syslog Inputs guide using TCP as the transport and format BSD.

Log Format Example

date=2021-06-22 time=14:32:46 devname="ABCD-EFG-HIK-LMN-202-87-35-206" devid="FGA20E5Q16027714" logid="0000000013" type="traffic" subtype="forward" level="notice" vd="root" eventtime=1624352568074022779 tz="+0530" srcip=x.x.x.x srcport=50198 srcintf="wan1" srcintfrole="wan" dstip=2.2.2.2 dstport=4510 dstintf="wan2" dstintfrole="wan" sessionid=2912907682 proto=6 action="close" policyid=32 policytype="policy" poluuid="5b3cd3ef-0fd0-51e7-1222-9c9e72bdfbba" service="4510" dstcountry="India" srccountry="India" trandisp="dnat" tranip=1.1.1.1 tranport=4510 duration=62 sentbyte=2049 rcvdbyte=2703 sentpkt=12 rcvdpkt=11 appcat="unscanned"

What is Provided

  • Rules to parse, normalize, and enrich Fortigate Content Pack messages.

  • A Fortigate Spotlight content pack

GIM Categorization

GIM categorization is provided for the following messages:

fortigate_subtype gim_event_type_code gim_event_category gim_event_class gim_event_subcategory gim_event_type
forward 120000 network network.network connection network connection
multicast 129999 network network.default network message
sniffer 129999 network network.default network message
webfilter 129999 network network.default network message
virus 309999 detection detection.default detection_message
anomaly 309999 detection detection.default detection_message
local 129999 network network.default network message
ssl 129999 network network.default network message
ips 300001 detection detection.network_detection network_detection
signature 309999 detection detection.default detection_message
0100026001 290300 dhcp protocol dhcp.acknowledgement dhcp acknowledgement
0104043666 290100 dhcp protocol dhcp.offer dhcp offer
0104043664 290000 dhcp protocol dhcp.request dhcp request

Message Fields Included in This Pack

Parsed Fields

This pack applies normalization to common fields that are present in all FortiGate event logs.

FortiGate Source Property Normalized Field Name
srcintf network_interface_in
dstintf network_interface_out
srcmac source_mac
dstmac destination_mac
srcip source_ip
srcport source_port
dstip destination_ip
dstport destination_port
dst_host destination_host
sessionid session_id
policyid policy_id
policytype policy_type
service network_application
sentbyte source_bytes_sent
rcvdbyte destination_bytes_sent
sentpkt source_packets_sent
rcvdpkt destination_packets_sent
tunnelip tunnel_ip
remip remote_ip
locip local_ip
devid event_observer_id
apprisk vendor_threat_suspected
hostname destination_domain
vd virtual_domain_name
utmaction vendor_utm_action
user user_name
vendor_hostname host_hostname
app application_name
logid event_id
filename file_name
filetype file_type
craction vendor_threat_weight_action
crlevel vendor_threat_weight_level
crscore vendor_threat_weight_score
agent http_user_agent
from source_user_email
to destination_user_email
sender http_sender
fctuid vendor_client_user_id
url http_url
dtime event_created
itime event_received_time
vrf vendor_virtual_routing_and_forwarding
dstepid vendor_destination_endpoint_id
fctemssn vendor_client_endpoint_ssn
addr vendor_address
euid vendor_enduser_id
threat threat_category
attack vendor_alert_category
cve cve_number
itime_t vendor_log_received
idseq event_uid
ref vendor_reference_url
mastersrcmac vendor_source_master_mac
srccountry vendor_source_country
dstcountry vendor_destination_country
srcuuid vendor_source_uuid
srcname vendor_source_name
appcat vendor_application_category
dstname vendor_destination_name
qclass query_class
ipaddr dns_value
osname vendor_source_os_name
trandisp vendor_nat_translation_type
appid vendor_application_id
utmref vendor_reference_to_utm
ssid wifi_ssid
channel wifi_channel
encryption wifi_encryption
stamac host_mac
remotewtptime vendor_remote_wifi_radius_authentication_time
vap wifi_virtual_access_point
qname query_request
qtype query_record_type
qtypeval query_record_type_code
applist vendor_application_list
lanin vendor_incoming_lantraffic_bytes
lanout vendor_outgoing_lantraffic_bytes
wanin vendor_incoming_wantraffic_bytes
wanout vendor_outgoing_wantraffic_bytes
countav vendor_number_of_associated_av_logs
countapp vendor_number_of_associated_app_ctrl_logs
cfgattr vendor_configuration_attribute
cfgpath vendor_configuration_path
cfgtid vendor_configuration_id
cfgobj vendor_configuration_setting
dvid vendor_device_id
epid vendor_endpoint_id
tz vendor_time_zone
dstosname vendor_destination_os_name
devtype vendor_source_device_type
dstdevtype vendor_destination_device_type
duration event_duration
virus vendor_virus
attackid vendor_attackid
virusid vendor_virusid
viruscat vendor_viruscat
proto vendor_proto
eventtime vendor_eventtime
action vendor_action
time vendor_time
date vendor_date
status vendor_status
eventtype vendor_eventtype
pri vendor_pri
severity vendor_severity
devname vendor_devname
type vendor_type
subtype vendor_subtype
attachment vendor_attachment
direction vendor_direction
srcdomain vendor_srcdomain
subject vendor_subject
dtype vendor_dtype
profile vendor_profile
quarskip vendor_quarskip
id vendor_id
msg vendor_msg
count vendor_count
icmpcode vendor_icmpcode
icmpid vendor_icmpid
icmptype vendor_icmptype
transip vendor_transip
transport vendor_transport
tranip vendor_tranip
tranport vandor_tranport
logdesc vendor_logdesc
method vendor_method
reason vendor_reason
sn vendor_sn
ui vendor_ui
security vendor_security
ap vendor_ap
policyname policy_name
dsthwvendor vendor_destination_hw_interface
dstintfrole vendor_destination_interface_role
srchwvendor vendor_source_hw_interface
srcintfrole vendor_source_interface_role
dstserver vendor_destination_server
srcserver vendor_source_server
poluuid policy_uid

Event Enrichment

The following fields are added to all FortiGate event messages:

Field Name Description
event_severity Text description of the severity rating of the event
event_severity_level Numeric representation of the severity rating of the event
vendor_event_severity_level Vendor-defined numeric severity rating for the event
destination_reference Mapped from source_ip or source_hostname in that order
source_reference Mapped from source_ip or source_hostname in that order
host_reference Mapped from host_ip or host_hostname in that order - allows a common field to reference for messages that do not provide both
event_source Source system that generated the event
vendor_full_url The normalized full url based on combination of destination_domain and http_url

Fortigate Spotlight Content Pack

The Fortigate Spotlight Pack offers an overview dashboard with the following tabs:

Overview

DNS

Application Control

Virus