Description
This article describes why FortiAnalyzer Compromises host show the Detect Method as Infected-domain.
Scope
FortiAnalyzer.
Solution
IOC Uses Threat info database.
Here is how IOC works:
As the WF logs coming in, the breach detection engine parses the logs and categorizes the 'normal looking' web traffic into two main categories (based on the information from the TDS package):
Infected: real breach.
'A match or matches of the blacklisted IPs/DGA domains etc have been found from the web logs'.
The whole idea of IOC is identifying potential threat domains which are not identified by FortiGate web filtering service.
IOC engine monitors each URL/IP this host has visited over period of time and continuously analyze the behavior pattern using its internal algorithm to determine if the host is compromised.
IOC require separate threat detection license.
Difference between demo and paid version, and potentially the reason to the 'verdict' potentially giving 'outdated' results.
The demo mode IOC: uses the default threat package which comes with the firmware release.
The default package is NOT up-to-date.
The licensed IOC uses fresh threat package (daily downloaded) from FortiGuard and it produces much accurate detection.
How to check domain is infected as per TIDB database:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.