FortiSIEM
FortiSIEM provides Security Information and Event Management (SIEM) and User and Entity Behavior Analytics (UEBA)
vschmitt_FTNT
Article Id 315395
Description

Remediation script on FortiSIEM for FortiMail provides a remediation action on incident. This article describes the configuration on FortiMail and in FortiSIEM.

Scope FortiMail, FortiSIEM, Remediation.
Solution

In FortiSIEM it is necessary declare the Access Method for FortiMail:

  • Device Type: Fortinet FortiMail.
  • Access Protocol: HTTPS.
  • Port: 443.
  • URI: <leave empty>.
  • Username and Password.

Note:

The URI should be empty. In the Device credential association, create the association using the FQDN to verify the SSL certificate.

The test connectivity should be successful.

 

Remediation scripts:

FortiMail remediation is located under /opt/phoenix/data-definition/remediations. The scripts makes 2 API calls when triggered:


It will be necessary to modify the session_profile variable in the script to match the FortiMail configuration. In FortiMail, enable the REST API in webservice:

  • Connect to a console in FortiMail.
  • Enable the REST API:

 

config system web-service
(web-service) # set rest-api-status enable

 

The username used to connect must have REST access:

  • Connect to FortiMail GUI.
  • Enable the Advanced View.

 

advanced_view.png

 

  • In System/Administrator, edit the user and verify the REST API is enabled:

 

edit_administrator.png

 

  • In Profile/Session, edit the profile session used in the script:

 

profile_session.png

 

  • Expand the list at the bottom and enable 'Enable sender blocklist checking':

 

session_profile_enable.png