Two ways to do it 1. Import a Malware IP/Domain/Hash/URL list in
FortiSIEM. Then you can use it in rules e.g. destIp IN
Malware_IP_Group_1 and ir will be automatically used in Reputation
Checks for Incidents (on demand or automated via notification p...
By design, Cases can not be deleted. They can only be marked Closed.
Then they will disappear from default view. Database will be cleaned up
later in a consistent way. This is similar in principle to most bug
tracking systems . Users making changes t...
FSM can be integrated with any Reporting tool as follows. We have
extensive public REST APIs. You can pull data using those APIs and use
them in Power BI.
It works as follows: For certain login events, we monitor the longitude
and latitude of the source IP address. If the distance between two geo
positions from successive logons to the same server is greater than the
travel time between the two locatio...