Description | This article describes how to configure FortiEDR to detect the EICAR test file |
Scope | FortiEDR. |
Solution |
FortiEDR is capable of detecting signature-based malware or files that are marked as malicious on our database.
As EDR, and different then a traditional AV, we do not scan HDDs constantly but instead rely on behavior analysis and pre-execution detections.
To detect EICAR, the first thing that needs to be checked is the policies under Execution Prevention: Execution Prevention - Suspicious file Detected and Unconfirmed file detected should be Enabled.
These two policies must be activated and collectors are assigned to the correct Security Policies.
Second, assign the collector at least the default THR inventory profile so we can also take advantage of Inventory Scanning.
Then, try copy-pasting the malicious file to the host. Steps to reproduce:
Expected results:
Actual results: The security event is triggered only when executing the file on the Collector
**Manager content should be at least 12100 and up
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.