Description | This article describes the purpose of edrdata.db and the steps to prevent huge file sizes. |
Scope | FortiEDR |
Solution |
edrdata.db is used to store events collected by FortiEDR Collector related to threat hunting events which the FortiEDR administrator has configured in Security Settings -> Threat Hunting -> Collection profile.
This includes:
The edrdata.db file is usually a hundred megabytes in size. However, in some cases, after running FortiEDR collector for quite some time with a standard or comprehensive threat hunting collection profile assigned, the edrdata.db file might occupy huge disk space.
This can happen when a threat-hunting collection profile is configured to collect events that result in unnecessary event collections. Events as such can be checked by accessing Threat Hunting, Filter by the device name, expanding facets and referring to the top counts: Facets
From the top counts listed, threat-hunting exclusions can be configured to prevent FortiEDR collectors from collecting events for threat-hunting usages: Collection Exclusions
Workaround for Windows if edrdata.db is occupying disk usages:
"C:\Program Files\Fortinet\FortiEDR\FortiEDRCollectorService.exe" --stop
There will be a prompt to enter the device registration password which can be obtained in the FortiEDR console.
3. In the same command prompt (running as administrator), execute command below to start FortiEDR Collector: "C:\Program Files\Fortinet\FortiEDR\FortiEDRCollectorService.exe" --start
Workaround for Linux if edrdata.db is occupying disk usages:
1. Stop FortiEDRCollector from running by executing command below in terminal:
There will be a prompt to enter device registration password which can be obtained in FortiEDR console.
sudo /opt/FortiEDRCollector/control.sh --start |