Hi All,
What is the difference between the Detection Technologies on rules as its not clarified on previous versions of documentations
thanks, on advance
#Rules
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Classification of the technology being used for the rule.
#Correlation - most common rule type. Pattern based.
Examples to review:
-> Account Locked: Domain
-> Suspicious Logon Failure without following successful login
#Correlation Using Lookup Table - also Pattern based but uses data from a Lookup table in the evaluation of the pattern. (The lookup table needs to be populated via the import button)
Examples to review:
-> Uncommon Linux process Created
-> Uncommon Server Login
#Machine Learning - References that backend AI models are being used to generate the alerts. For UEBA alerts.
Examples to review:
-> UEBA AI detects unusual file deletion
-> UEBA AI detects unusual file renamed
#Profiling - Uses the statistical baselining data to alert on a change in behaviour over time. (sqlite db)
Examples to review:
-> Sudden Increase In DNS Requests From A Specific Host
-> Sudden User Location Change
Welcome to your new Fortinet Community!
You'll find your previous forum posts under "Forums"
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.