Cybersecurity Forum

This forum is for all security enthusiasts to discuss Fortinet's latest & evolving technologies and to connect & network with peers in the cybersecurity hemisphere. Share and learn on a broad range of topics like best practices, use cases, integrations and more. For support specific questions/resources, please visit the Support Forum or the Knowledge Base.

dArA
New Contributor

EDR collector office work

Dear Everyone,

I have some questions regarding EDR, When the collector is offline from the FortiEDR core, once it is downloaded the suspicious or zero-day files that cannot identify by machine learning and signature-based on the collector task, so what going on on this collector machine/device? let's say in case EDR core has any issues like connectivity issue or it down.


Second question, Can you share with me the key point for convincing the customer to use our FortiSASE and what exactly our FortiSASE can do?

Regards,
Dara
DARA RIM
DARA RIM
1 Solution
BrooChel
Staff
Staff

Hi Darra, if the collector is offline and let's say the infection comes through a USB key and the device is completely offline, you would have to trust the anti-malware engine to protect the device in that situation. The anti-malware engine is very effective, but if offline, FCS won't be able to see it and reclassify if it needs to. The client will react based on what it is programmed to do via playbooks.

View solution in original post

2 REPLIES 2
BrooChel
Staff
Staff

Hi Darra, if the collector is offline and let's say the infection comes through a USB key and the device is completely offline, you would have to trust the anti-malware engine to protect the device in that situation. The anti-malware engine is very effective, but if offline, FCS won't be able to see it and reclassify if it needs to. The client will react based on what it is programmed to do via playbooks.
dArA
New Contributor

Hi Brook, Well noted for your great explanation.

BRs,
Dara
DARA RIM
DARA RIM