Overview

We are providing the steps to integrate your Fortianalyzer with Seceon SIEM to have Comprehensive visibility and Proactive Threat Detection in your Environment. There will be a log transfer between your firewall to APE(Analytics and Policy Engine) via CCE (Collection and Control Engine ). In this document, we guide you through the Log and forwarding steps.

Steps of configuration

Login to the Fortianalyzer

Go to System Settings > Advanced > Syslog Server.

Click Create New in the toolbar. The Create New Syslog Server Settings pane opens.

Configure the following settings and then select OK to create the mail server.

To add a Syslog server:

CLI Configuration for local logs
After adding a Syslog server to FortiAnalyzer, the next step is to enable FortiAnalyzer to send local logs to the Syslog server. You can only enable these settings by using the CLI.

Verification Of Configuration

Verification can be done either from CCE Server or from the Seceon GUI.

Log in to the Seceon GUI with Administrator Access and Navigate to System >> Log/Flow Collection Status

inside SOURCE DEVICE IP, IP will reflect.

Using the Seceon CCE Server

Login into CCE Server with seceon login credentials & following command should be running on the CCE server to check whether or not we are getting logs.

sudo tcpdump -i any host 514 and host <IP address> -s0 -AAA