Description
This article describes how to implement Indicators Of Compromised (IOC) Automation Stitch between FortiGate, FortiAnalyzer and FortiClient EMS.
Pre-requisite.
Refer to the related articles section and to the document below.
Related document:
Viewing Compromised Hosts
Indicators Of Compromised (IOC) Flow.
Scope
FortiGate v6.4.4, FortiAnalyzer 6.4.5 and FortiClient EMS 6.4.3.
Solution
FortiGate.
Configure a firewall policy going to the Internet that has a web filter profile enabled on it. This is required for the IOC to work.
config firewall policy
edit 0
set srcintf "port3"
set dstintf "virtual-wan-link"
set srcaddr "10.115.2.52/32"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set webfilter-profile "monitor-all"
set logtraffic all
set nat enable
next
config system automation-stitch
edit "Compromised Host Quarantine"
set trigger "Compromised Host Quarantine"
set action "Compromised Host Quarantine_quarantine-forticlient"
next
end
Related articles:
Technical Tip: Configuring the root FortiGate and downstream FortiGates in Security Fabric
Technical Tip: EMS Connector setup
Technical Tip: How to integrate EMS in the FortiAnalyzer
Troubleshooting Tip: IOC detection
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.