FortiSIEM Discussions
dmontgomery
New Contributor III

Fortisiem raw events

We are doing analytics on ADFS logon failures - Windows event ID 364. We are interested the Relying Party specifically. We want to get counts of the logon failures by the Relying Party. We can see the relying party in the raw event message but it cannot be queried on in the analytics or selected as a display column. Does anybody know how to handle this situation?

1 Solution
dmontgomery
New Contributor III

After opening a ticket with Fortinet support this has classified as a bug: bug report #1028529

 

 

View solution in original post

7 REPLIES 7
cdurkin_FTNT
Staff
Staff

Can you post a sanitized raw message from FortiSIEM and I can take a look?

dmontgomery

Here is the raw message format:

"

2024-04-03T15:05:04Z ADFS.ABDEF.com 192.168.194.244 celOps-WUA-WinLog-AD xx/xxxx [phCustId]="1" [customer]="super" [monitorStatus]="Success" [Locale]="en-US" [MachineGuid]="92bb4a15-e201-4a1c-a415-db27b1ec3e32" [timeZone]="-0500" [eventName]="AD xx/xxxx" [eventSource]="AD FS" [eventId]="364" [eventType]="Warning" [domain]="abcdefg" [computer]="ADFS.ABDEF.com" [user]="bob" [userSID]="S-1-5-21-1960408961-1303643608-1801674531-49031" [userSIDAcctType]="User" [eventTime]="Apr 03 2024 15:05:03" [deviceTime]="Apr 03 2024 15:05:03" [msg]="Encountered error during federation passive request.

Additional Data

Protocol Name:
Saml

Relying Party:
https://app.company.com/application

Exception details:
Microsoft.IdentityServer.Protocols.Saml.SamlProtocolSignatureAlgorithmMismatchException: MSIS7093: The message is not signed with expected signature algorithm."

cdurkin_FTNT

Thank you.

 

If you are using ClickHouse as the database you can use the EXTRACT function as follows in a Display Field..

 

EXTRACT(Raw Event Log, "Relying Party: (.*?\n)")

This should give you what you need in a field, and then you can add the COUNT.

dmontgomery

Our version is 6.7.9. Is Phoenix the clickhouse database? I thought it was based on Postgres.

cdurkin_FTNT

The way to check would be under Admin -> Setup -> Storage / Online and look the Event Database.

 

if this is EventDB then your only option would be a parser modification to extract the value.

dmontgomery

It's eventDB. Modifying the parser doesn't sound like an easy task.

dmontgomery
New Contributor III

After opening a ticket with Fortinet support this has classified as a bug: bug report #1028529

 

 

Announcements

Welcome to your new Fortinet Community!

You'll find your previous forum posts under "Forums"