FortiSIEM Analytics Cheatsheet
FortiSIEM Analytics Cheatsheet
One of the features that we utilise the most in FortiSIEM is the Analytics feature. Through analytics,
we can search for events depending on one or multiple attributes which help us in investigating
certain events, users, IP addresses as well as create reports, whenever necessary.
Analytics can be divided into two main parts. That is the attribute search, where we can search for
events where certain attributes are matched, and the group by and aggregation where we can
specify which attributes from the search itself we want to be displayed, or we can perform actions
on the search results such as a count of all events matching specific attributes.
With that in mind, in order to perform precise and correct searches, we need to primarily know what
the event attributes mean. Below is a table of the most used/useful event attributes:
User ID UserID can be used to search for events relating to a specific user in the
organisation.
User User is practically the same as UserID. In some organisations one will be
used instead of the other. If unsure, you can try a search for UserID OR
User
Reporting IP Reporting IP is the IP address of the device that is reporting the event to
FortiSIEM. This could be a firewall, server, collector etc.
Event Type This specifies the type of event that occurred. This is dependant on the
device from which the event originated. For example, windows security
events will always look like win-security-xxxx.
Event Name This specifies the name of the event that occurred. Basically, it is a
simplification of the Event Type attribute.
Report Device The name of the device that reported the event.
Host Name The name of the device from which the event originated.
Raw Event Logs Raw event logs is referring to the logs as the FortiSIEM received them,
without being parsed.
Event Receive Time The time when the event was received by the FortiSIEM collector.
When doing an analytics search with multiple event attributes, you can use the AND and OR
operators between them. You use “AND” when you want the value of both the attributes that you
have added to be true, “OR” is used when you want one or the other to be true for the results.
It is also important to use the correct boolean operator when performing a search, or in other
words, you need to know if the value is the exact one, should be in a group, is something the
attribute would contain etc.
- If we are searching for activity regarding the user “majstor” we would add User or User ID as
the attribute, “=” as the boolean operator and “majstor” as the value. Accordingly, if we
want to search activity for every user apart from the user “majstor” we can use the “!=”
operator.
- If we are searching for logs where the source IP is in a specific IP range, we would use the
“IN” operator instead of “=” since we do not know the exact value for the source IP. If we
want to search for logs for source IPs out of that range we can use the “NOT IN” operator.
- The operators “IS” and “IS NOT” can only have a value of “NULL”. If we know that a certain
attribute will have a value, but we are uncertain what that value will be, we can use the “IS
NOT” operator with the value “NULL”.