Created on
08-15-2023
10:37 PM
Edited on
08-15-2023
10:38 PM
By
Anthony_E
| Description |
This article describes how to use a custom event handler in FortiAnalyzer to raise alerts for incident response related to attacks that attempt to leverage the Top Routinely Exploited Vulnerabilities 2022. A report is also provided to gain historical visibility into the logs. Note that this article provides alpha files that are automatically generated. The article will be continually updated as more information becomes available. |
| Scope |
This article contains the files necessary to load an event handler and report into your FortiAnalyzer for either a Fabric ADOM or a FortiGate ADOM. The Fabric report and event handler leverage logs from other Fortinet products that can be used to detect the attack in addition to FortiGate logs. For more information about this attack, see the following FortiGuard Outbreak Alert: https://www.fortiguard.com/outbreak-alert/routinely-exploited-vulnerabilities-2022 |
| Solution |
What is included in Fortinet_Top Routinely Exploited Vulnerabilities 2022.zip:
This event handler helps identify Top Routinely Exploited Vulnerabilities 2022 detected by FortiGates and other Fortinet products.
2. Top Routinely Exploited Vulnerabilities 2022_report.dat This report displays the findings on Top Routinely Exploited Vulnerabilities 2022 attacks from FortiGates and other Fortinet products.
3. fgt_Top Routinely Exploited Vulnerabilities 2022_event-handler.json The event handler for FortiGate ADOMs is configured for FortiGate logs only.
4. fgt_Top Routinely Exploited Vulnerabilities 2022_report.dat The report for FortiGate ADOMs includes FortiGate charts only.
Steps:
Result: The event handler is enabled and will be triggered if the appropriate logs are received following the import of the event handler. Edit the event handler to customize the notification section.
4. Import Top Routinely Exploited Vulnerabilities 2022_report.dat or fgt_Top Routinely Exploited Vulnerabilities 2022_report.dat to Reports:
Result: The Top Routinely Exploited Vulnerabilities 2022_report can be run anytime as determined by an admin user. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.