Dear community members,
I hope this message finds you well. I have a question regarding Fortigate IPS, specifically about the scope of its analysis. Does the firewall's IPS exclusively analyze incoming traffic (e.g., WAN to LAN, WAN to DMZ, etc.), or does it also scrutinize outgoing traffic (e.g., LAN to WAN, LAN to LAN, etc.) for potential threats?
The reason I'm raising this question is that I recently encountered an IPS alert with the description "Backdoor: Backdoor.Cobalt.Strike.Beacon." The details provided were as follows: Source - Public IP address, Destination - Internal address (switch), Direction - Outgoing. I'm seeking clarification on what this alert precisely signifies. Does it imply a compromised internal machine? Could you please provide a more in-depth explanation of this alert?
Thank you for your assistance and insights.
Best regards,
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hello
In my understanding IPS scans both in and out traffic depending on the IPS profile.
E.g.: protect_client profile mainly (but not exclusively) analyses responses from server, while protect_server profile mainly analyses queries from client.
Regarding the backdoor alert it is not simple to provide definite response, but basically the firewall detected suspicious communication, but it doesn't mean that your host is 100% compromised. The next action would be to scan the host and investigate further.
Dear Lonis,
These articles could be helpful in your case:
https://community.fortinet.com/t5/FortiManager/Troubleshooting-Tip-IOC-license-false-positives/ta-p/...
https://community.fortinet.com/t5/FortiAnalyzer/Technical-Tip-How-to-enable-IOC-re-scan/ta-p/227120
https://community.fortinet.com/t5/FortiAnalyzer/Troubleshooting-Tip-IOC-detection/ta-p/191315
https://docs.fortinet.com/document/fortianalyzer/6.2.0/cookbook/779346/how-ioc-works
Look in the raw logs of ips. there is a parameter called direction. It's values: incoming or outgoing.
A situation where your FortiGate firewall generates an IPS alert for suspicious outgoing traffic, indicating potential exploitation. For instance, you may receive an alert with the description "Suspicious Activity: CVE-2023-XXXX Exploit Attempt." Upon investigation, you discover that the source IP is an internal server, while the destination IP belongs to an external entity. This raises concerns about a possible compromise of the internal server and unauthorized attempts to exploit a known vulnerability.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1688 | |
1087 | |
752 | |
446 | |
227 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.