Created on
11-26-2025
11:31 AM
Edited on
11-26-2025
10:02 PM
By
Jean-Philippe_P
| Description | This article describes how to use Incident view, formerly known as Event Viewer, in FortiEDR Manager. |
| Scope | FortiEDR Manager version 7.2+. |
| Solution |
This article covers several elements of the Incident view, including:
Incident Status Meanings:
Incident Types:
Understanding Incident Aggregation: Incidents are now aggregated into a hieratical structure based on the process name. It is important to note that the top-level incident no longer represents sub-incidents and instead is represented as its own incident entity. It is no longer 'aggregated' based on classification or rules, as seen in FortiEDR version 6.2 and earlier.
The drop-down button (1) will expand the incident, offering more insights into the incident itself.
The classification (2) represents the individual incident. When expanding the incident to display its child incidents, it is expected that the severity level may differ among them. This is normal behavior because each incident may be triggered by different rules, resulting in different classifications:
Incident Classification:
Classifications can come from two sources: an administrator or Fortinet (FortiEDR Core and/or Fortinet Cloud Services(FCS)).
Classifications are a guide for incident analysis and prioritization. An event classified as likely safe is not as urgent as an event that has received a 'Malicious' classification from Fortinet Cloud Services, for example.
'Fortinet' (aka Core) will likely be the first classification source. Later on, Fortinet Cloud Services will provide a classification verdict. This can be changed by a security administrator.
Each incident may be reclassified at a later time by selecting the 'Handle Incident' button.
The following classification levels can be applied:
Security Rules: Security rules are divided into two groups: pre-execution (included in execution prevention policy), post-execution (included in exfiltration prevention and ransomware prevention policies)
Incident Analysis: The Incident analysis pane contains the following data: event graph, automated analysis information, and general information.
The event analysis view provides extended event details, based on the Threat Hunting data:
Exceptions: Exceptions are used to whitelist false positive incidents:
Exceptions Setup: It is recommended to define the path for the selected exception processes:
Exception Setup: If the event was triggered with the command execution, the command line should be selected as a condition. Conditions support two options: 'exact match' and 'contains'.
It is recommended to set up each exception to be as specific as possible: define the exception application scope with collector, groups, destinations, and users:
If the exception does not cover all events, a specific icon for the exception will be shown (1).
Event Handling: Events reclassification is optional, but considered good practice.
Exceptions are required to prevent recurrence of the same events:
Related documents: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.