Hi All,
I want to create a watchlist with around 100 keyword entries.
Each entry contain wildcards (*).
In rule condition, I want FortiSIEM to check whether an event attribute matches any of the wildcard (regex) patterns from the entire watchlist.
If a match is found → the rule should trigger an incident.
could some one guide how to achieve this ? does SIEM support wildcards ?
@Secusaurus @Anthony_E could you please help here
I ran into this too—wanted to bulk monitor domains with similar patterns and thought a wildcard would do it. Turns out Fortinet doesn’t support traditional wildcards like *.domain.com in Watchlists directly. Best workaround I found was scripting API-based updates to the list with all variations. Not ideal, but it gets the job done if you automate it right.
@tylerkelley1980 thanks for sharing will try this
Hi everyone,
Just as a note: At the moment, a workaround is the only option. The database query using watchlists only understands "is it in the list?", which means a 100% match.
You could, however, have a look at the Advanced Queries (from 7.3 onwards), which is coming more and more to the rules as well, and try to build something to improve your lookup. But this also has limitations at the moment.
Best,
Christian
@gauravpawar , the closest we came to that functionality is the utilisation of dnstwist and API to update watchlist.
Regards,
S
You could use an Advanced Search (SQL) to do this, as long as your event database is ClickHouse.
If you want to use a rule, make sure the SQL display columns do not contain spaces.
Welcome to your new Fortinet Community!
You'll find your previous forum posts under "Forums"
User | Count |
---|---|
72 | |
25 | |
15 | |
10 | |
10 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.