FortiAnalyzer can receive logs and Windows host events directly from endpoints connected to EMS, and you can use FortiAnalyzer to analyze the logs and run reports.
Article Id 197632
This article describes how to use a custom Event Handler and Report in FortiAnalyzer to detect indicators attributed to the Kaseya VSA vulnerability. This vulnerability can be exploited for ransomware attack. See CVE-2021-30116 for reference.

For more information on the threat, also see the FortiGuard Lab Threat Signal Report:

What is included in

1) Kaseya Ransomware Detection-v3.json
This event handler helps identify indicators detected by FortiGate's and FortiClient's IPS and Endpoint Vulnerability signatures. Logs triggering the event handler are generated from FortiGate and FortiClient. Therefore, their corresponding IPS and Endpoint Vulnerability signatures should be kept up to date to prevent and log the exploits.

FortiGate: Ensure IPS Signature package is at least 18.112 or higher in order to cover Kaseya.VSA.Remote.Code.Execution
FortiClient: Ensure Endpoint Vulnerability Protection is at least 1.250 or higher to cover Security Vulnerability cve-2021-30116 for Kaseya Server

2) Kaseya_ransomware_detection_report-v3.dat
A report to summarize findings on activities related to the Kaseya VSA vulnerability, as detected by the AV and IPS Engine on FortiGate and FortiClient devices.

See the Solution section for instruction on how to load the event handler into a FortiAnalyzer unit.

The custom Event Handler and Report provided can be used in FortiAnalyzer 6.4+.
All screen shots provided below for illustration purposes are taken from FortiAnalyzer 6.4.4.
1) Download the file (contains 2 files)
2) Unzip
3) Use Kaseya Ransomware Detection-v3.json to import into Event Handlers
    a. Choose an ADOM (if ADOMs are enabled)
    b. Choose the FortiSOC module
    c. Select Event Handler List
    d. Select the Import option under "More"
    e. Select Kaseya Ransomware Detection-v3.json
Result: Kaseya Ransomware Detection-v3.json is enabled and will be triggered if the appropriate logs are received after after the event handler was imported

4) Use Kaseya_ransomware_detection_report-v3.dat to import into Reports
    a. Choose a Fabric ADOM (if ADOMs are enabled)
    b. Choose the Report module
    c. Select the Import option under "More"
    d. Select Kaseya_ransomware_detection_report-v3.dat
Result: 'Kaseya_ransomware_detection_report-v3.dat' can be run anytime as determined by an admin user.