FortiWeb
A FortiWeb can be configured to join a Security Fabric through the root or downstream FortiGate.
shafiq23
Staff & Editor
Staff & Editor
Article Id 415752
Description This article describes how to configure Automation to send an alert email when an OWASP Top 10 category is matched in the attack log.
Scope FortiWeb.
Solution

When a signature is triggered or any other relevant attack log is generated, it includes OWASP Top 10 categories such as:

 

  • A01:2021-Broken Access Control
  • A02:2021-Cryptographic Failures
  • A03:2021-Injection

 

1.png

 

Security Fabric’s Automation stitch can use the attack log to send an alert to email services, Teams notification, or initiate a CLI script.

 

Refer FortiWeb administration guide for more information regarding Automation Actions configuration: Creating an action 

 

Automation stitch configuration:

Create a new Automation action.

 

2.png

 

To create Email Policy: Alert Email 

 

Create a new Automation trigger:

  • Select Event type.
  • Define log field filter matching.

 

In this sample, to match the signature attack log for the OWASP Top 10 category 'A03:2021-Injection' with Alert action.

 

3.png

 

Note:

Attack log event type might be varied for different attack types. Selectthe  appropriate event type to match the log properly.

 

To verify which OWASP Top 10 category is enabled in the server policy: OWASP Top 10 Compliance

 

Create a new Automation stitch.

  • Select the created trigger and action(support multiple actions).

 

4.png

 

Related document:
Automation 

Contributors