Created on
12-11-2025
02:16 PM
Edited on
12-22-2025
03:42 AM
By
Jean-Philippe_P
This article describes the specifics of using a FortiAnalyzer Event Handler to trigger Automation Stitch on FortiGate connected to FortiAnalyzer.
The feature allows for a more complex trigger logic, based on the logs received on FortiAnalyzer from the logging FortiGate.
FortiAnalyzer, FortiGate.
The FortiGate should have reliable (TCP transmission) enabled, and the upload-option should be set to realtime to ensure a stable OFTP connection to FortiAnalyzer:
config log fortianalyzer setting
set status enable
set server "your.FortiAnalyzer.address"
set serial "your.FortiAnalyzer.Serial.Number"
set upload-option realtime
set reliable enable
end
On the FortiAnalyzer side, the device should be registered/authorized and show as 'green' in the FortiOS connector status:
Both Basic and Correlation handler types can be used, as long as they have the Automation Stitch option enabled:
The FortiAnalyzer Event Handlers, with the Automation Stitch option enabled, can then be selected as a trigger on the FortiGate.
Go to the FortiGate GUI -> Security Fabric -> Automation -> Trigger tab, and create a new trigger with the FortiAnalyzer Event Handler type:
Then select the FortiAnalyzer Event Handler from the menu:
Optional:
The two options, Event severity and Event tag, are additional conditions to match. They can be used, for example, to match only events generated by one specific rule of a Basic Event Handler with two or more rules.
The screenshot below demonstrates how these values correlate on the FortiGate and FortiAnalyzer side:
Note: If Event severity and/or Event tag are enabled but the event contains no matching values, the automation stitch on the FortiGate will not be triggered.
These options are not intended for the Correlation Handlers. Although they can be technically used, the Tags and Severity of the correlation handlers are global for the whole handler. So, every event generated by the selected handler would have the same tags and severity, which makes them redundant and harder to manage in this scenario.
As a rule of thumb, if a Correlation Handler is selected in the automation trigger, keep Event severity and/or Event tag disabled.
Once the Trigger has been created, it can be used in an automation stitch:
In this example, the event flow would look like this:
If the FortiGate action is not executed (Troubleshooting):
Related document:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.