FortiEDR
FortiEDR automates the protection against advanced threats, pre and post-execution, with real time orchestrated incident response functionality.
rkatmor
Staff
Staff
Article Id 209594
Description This article describes how to enable FortiClient EMS to enforce zero-trust policies based on FortiEDR security posture feeds.
Scope FortiEDR/EMS-Cloud.
Solution

General Concept.

 

FortiClient EMS holds in store the ability to tag hosts and enforce access policies in respect.

The goal of this article is to enable a seamless integration between #FortiClient Cloud-EMS and FortiEDR, one that will allow to assign hosts in #FortiClient EMS with FortiEDR associated security tags and by doing so restrict the host accessibility based on its security posture.

 

Integration Steps.

 

1) Create a cloud-EMS connector:

Effective v5.0.3 FortiEDR supports OOTB (Fabric related) and custom associated connectors which allow to integrate FortiEDR with any 3rd party entity and trigger OOTB and customized actions per the applied playbook policy.

#Cloud-EMS connector will be set as 'Custom Connector' as listed under Administrator -> Integrations.

 

rkatmor_0-1650348833666.jpeg

 

Ensure to fill the following:

- Select a jumpbox component (enforced by the 'custom connector' option as part of an anti-tampering requirement).

- Add the wishful connector-name, host and port and API-key as generated by the #EMS-Cloud environment in subject.

 

rkatmor_1-1650348833672.png

 

2) Add an 'EMS Tag Sharing' action:

Under the Administration -> Integrations, select the 'Add Action' option on the right end of the 'custom connector' window and select 'Create new action' option:

 

rkatmor_2-1650348833679.png

 

rkatmor_3-1650348833685.png

 

At the action manager dialog, list an action name (1) (this action will become available in the playbook template under 'CUSTOM' actions section), description (2) and select the 'Upload' action script button (3).

Select the #EMS-Cloud script as listed in this article and select 'Save'.

 

rkatmor_4-1650348833692.png

 

Once saved, select the 'Add' and verify the connector functionality by selecting the 'test' button:

 

rkatmor_5-1650348833697.png

 

rkatmor_6-1650348833703.png

 

rkatmor_7-1650348833708.png

 

The test script will return '0' for success and different error messages incl. respective stdout (print associated) and stderr verbose logs for failures.

 

Enable and save the connector:

 

rkatmor_8-1650348833711.png

 

3) Enable the new custom action in the extended playbook options:

Under the Security Settings ->Playbook option (1), ensure to enable the relevant connector (2) and the new added action listed under 'CUSTOM' action section for all the tag/classification associated options (3).

The playbook should be set to protection (4) and applied to the respective host group (5):

 

rkatmor_9-1650348833717.png

 

Expected Outcome:

Upon event triggering one should expect the following:

 

1) If not created already a new tag format (‘FortiEDR_CLASSIFICATION’) will be created under the #EMS-Cloud console.

 

rkatmor_10-1650348833723.png

 

2) Once an incident is triggered and associated with a host that is subject to the assigned playbook policy, the host will be associated with the triggered classification/tag in #EMS-Cloud.

 

rkatmor_11-1650348833729.png

 

Going Forward.

 

In order to further streamline and automate the different integrations process, we are planning to add further OOTB connectors and respective actions for Fabric and 3rd parties as part of v5.2 release (ETA Q2-22’) – #FortiClient Cloud-EMS tagging is planned to be one of those connector actions.

Contributors