Windows agent is going to send the file to FortiSIEM, line by line. One line is 1 log. You need to write a parser using the keyword (that you define in User log configuration from gui) as the event recognizer. Within the parser you can define event type based on parsed values. Then you can query using that event type and parsed values.
hope this explains.
Windows agent is going to send the file to FortiSIEM, line by line. One line is 1 log. You need to write a parser using the keyword (that you define in User log configuration from gui) as the event recognizer. Within the parser you can define event type based on parsed values. Then you can query using that event type and parsed values.
hope this explains.
Windows agent is going to send the file to FortiSIEM, line by line. One line is 1 log. You need to write a parser using the keyword (that you define in User log configuration from gui) as the event recognizer. Within the parser you can define event type based on parsed values. Then you can query using that event type and parsed values.
hope this explains.
Windows agent is going to send the file to FortiSIEM, line by line. One line is 1 log. You need to write a parser using the keyword (that you define in User log configuration from gui) as the event recognizer. Within the parser you can define event type based on parsed values. Then you can query using that event type and parsed values.
hope this explains.
Hi @IsuruTharanga ,
The configuration is correct. Currently Regex is not supported and prefix has to specified correctly. Else it would be ambiguous to pull new log separately.
Regards,
Prem Chander R
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2023 Fortinet, Inc. All Rights Reserved.