A guide to sending your logs from FortiWeb to Microsoft Sentinel using the Azure Monitor Agent (AMA).
Some clients may require forwarding logs to one or more centralized central log solution, such as Microsoft Sentinel. This approach supports advanced analytics, diverse compliance requirements, and various operational needs.
This guide provides a comprehensive walkthrough for integrating FortiWeb VM with Microsoft Sentinel via Azure Monitor Agent (AMA).
To ingest CEF logs from FortiWeb into Microsoft Sentinel, a dedicated Linux machine is configured to serve as proxy server for log collection and forwarding to the Microsoft Sentinel workspace.
The Linux machine is structured with two key components:
Syslog Daemon (Log Collector): using rsyslog , this daemon performs dual functions:
Azure Monitor Agent (AMA): The agent parses the logs and then sends them to your Microsoft Sentinel (Log Analytics) workspace via HTTPS 443.
For more details please review this link.
Prerequisites:
To establish the integration between Microsoft Sentinel and FortiGate, follow these steps:
This will install also some hunting queries, playbooks and workbook:
You can find below an ARM template example for DCR configuration:
{
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "1.0.0.0",
"parameters": {
"dataCollectionRules_WAF_a_a_S_name": {
"defaultValue": "WAF-a-a-S",
"type": "String"
},
"workspaces_ya_ama_externalid": {
"defaultValue": "/subscriptions/xxxxxxxxxxxxxxxxxxxxxxxxxxxx/resourceGroups/ya-faz-sentinel-ama/providers/Microsoft.OperationalInsights/workspaces/ya-ama",
"type": "String"
}
},
"variables": {},
"resources": [
{
"type": "Microsoft.Insights/dataCollectionRules",
"apiVersion": "2023-03-11",
"name": "[parameters('dataCollectionRules_WAF_a_a_S_name')]",
"location": "westeurope",
"tags": {
"createdBy": "Sentinel"
},
"kind": "Linux",
"properties": {
"dataSources": {
"syslog": [
{
"streams": [
"Microsoft-CommonSecurityLog"
],
"facilityNames": [
"local7"
],
"logLevels": [
"Notice",
"Warning",
"Error",
"Critical",
"Alert",
"Emergency"
],
"name": "sysLogsDataSource-1039681479"
},
{
"streams": [
"Microsoft-CommonSecurityLog"
],
"facilityNames": [
"nopri"
],
"logLevels": [
"Emergency"
],
"name": "sysLogsDataSource-1697966155"
}
]
},
"destinations": {
"logAnalytics": [
{
"workspaceResourceId": "[parameters('workspaces_ya_ama_externalid')]",
"name": "DataCollectionEvent"
}
]
},
"dataFlows": [
{
"streams": [
"Microsoft-CommonSecurityLog"
],
"destinations": [
"DataCollectionEvent"
]
}
]
}
}
]
}
Install the Common Event Format (CEF) collector on a Linux machine by executing the following Python script:
sudo wget -O Forwarder_AMA_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/Syslog/Forwarder_AMA_installer.py&&sudo python3 Forwarder_AMA_installer.py
sudo systemctl status rsyslog
sudo systemctl start rsyslog
sudo systemctl restart rsyslog
sudo netstat -tuln
sudo tcpdump -i any port 514 -A -vv &
After you complete the validation, we recommend that you stop the tcpdump: Type fg and then select Ctrl+C
sudo wget -O Sentinel_AMA_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/Syslog/Sentinel_AMA_troubleshoot.py&&sudo python3 Sentinel_AMA_troubleshoot.py --cef
You can review the link for more technical details about CEF integration With AMA.
Log forwarding to Microsoft Sentinel can lead to significant costs, making it essential to implement an efficient filtering mechanism.
In the Data Collection Rules (DCR) tab under the Collect section, you can define the minimum log level for each facility. When a log level is selected, Microsoft Sentinel will collect logs for the chosen level and all levels with higher severity. For instance, if you select LOG_ERR, Microsoft Sentinel will capture logs for LOG_ERR, LOG_CRIT, LOG_ALERT, and LOG_EMERG.
You can also configure the desired log type and log severity level directly through the log server options, ensuring precise control over which logs are forwarded to Microsoft Sentinel.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.