Skip to main content

FortiSIEM v2

This Integration is part of the FortiSIEM Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

Use FortiSIEM v2 to fetch and update incidents, search events and manage FortiSIEM watchlists. This integration was integrated and tested with FortiSIEMV2 version 6.3.2.

Changes have been made that might affect your existing content. If you are upgrading from a previous of this integration, see Breaking Changes.

Configure FortiSIEM v2 on Cortex XSOAR#

  1. Navigate to Settings > Integrations > Servers & Services.

  2. Search for FortiSIEM v2.

  3. Click Add instance to create and configure a new integration instance.

    ParameterDescriptionRequired
    Server URLFor example: https://192.168.1.1True
    UsernameTrue
    PasswordTrue
    Maximum incidents per fetch.Default is 20. Maximum is 200. Setting a value greater than 20 may harm performance, if used with 'Fetch With Events' mode.False
    First fetch timestamp (number, time unit. e.g., 12 hours, 7 days).False
    Filter incidents by status.False
    Fetch ModeIn some cases, performance might be impacted by using 'Fetch With Events' mode.False
    Maximum events to fetch per incident.Default is 20. Maximum is 50.False
    Use system proxy settingsFalse
    Trust any certificate (not secure)False
    Incident typeFalse
    Fetch incidentsFalse
  4. Click Test to validate the URLs, token, and connection.

Commands#

You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

fortisiem-event-search#


Initiate search process on events. Events are retrieved according to a constraint determined either by the query argument or by the filtering arguments. When using filtering arguments, an 'AND' operator is used between them. If the query argument is provided, it overrides the values in the filtering arguments.

Base Command#

fortisiem-event-search

Input#

Argument NameDescriptionRequired
queryThe query for filtering the relevant events. For example, "eventId=9071234812319593968 AND eventType='type'". You can retrieve the attributes' names using the command's filtering arguments or using the event attributes returned in the context output.Optional
extended_dataWhether to extend the data. This affects the number of attributes returned. Possible values are: false, true. Default is true.Optional
pollingUse Cortex XSOAR built-in polling to retrieve the result when it's ready. Possible values are: true, false. Default is false.Optional
search_idThe ID of the search query to retrieve its results. Intended for use by the polling process; does not need to be provided by the user.Optional
limitThe number of results to retrieve. Minimum value is 1. Default is 50.Optional
pageThe page number of the results to retrieve. Minimum value is 1. Default is 1.Optional
interval_in_secondsHow long to wait between command executions (in seconds) when 'polling' argument is true. Minimum value is 10 seconds. Default is 10.Optional
timeout_in_secondsThe time in seconds until the polling sequence timeouts. Default is 60.Optional
from_timeStart of the time filter for events. For example, "3 days ago", "1 month", "2019-10-10T12:22:00", "2019-10-10".Required
to_timeEnd of the time filter for events. For example, "3 days ago", "1 month", "2019-10-10T12:22:00", "2019-10-10".Required
eventIdEvent ID. Filtering argument.Optional
eventTypeEvent type. Filtering argument.Optional
reptDevIpAddrReporting IP address. Filtering argument.Optional
destActionDestination action. Filtering argument.Optional
destDomainDestination domain. Filtering argument.Optional
destIpAddrDestination IP address.Optional
destUserDestination user. Filtering argument.Optional
srcDomainSource domain. Filtering argument.Optional
srcGeoCountrySource geo country. Filtering argument.Optional
srcIpAddrSource IP address.Optional
userThe involved user in the event. Filtering argument.Optional
destMACAddrDestination MAC address. Filtering argument.Optional
srcMACAddrSource MAC address.Optional

Context Output#

PathTypeDescription
FortiSIEM.EventsSearchInit.search_idStringThe ID of the search query that executed against the events.

Command Example#

!fortisiem-event-search query="eventType='ASA-Built-Conn'" from_time=2022-02-10 to_time=2022-02-14

Context Example#

{
"FortiSIEM": {
"EventsSearchInit": {
"search_id": "46367,1644934487413"
}
}
}

Human Readable Output#

Successfully Initiated search query#

Search Id
46367,1644934487413

fortisiem-incident-update#


Update attributes of the specified incident. Only the provided attributes are overwritten.

Base Command#

fortisiem-incident-update

Input#

Argument NameDescriptionRequired
incident_idThe ID of the incident to update.Required
commentOverride incident's comment.Optional
statusUpdate incident status. Possible values are: Active, Auto Cleared, Manually Cleared, System Cleared.Optional
external_ticket_typeThe type assigned to the incident ticket in an external ticket handling system. Possible values are: Low, Medium, High.Optional
external_ticket_idThe ID of the incident in an external ticket handling system.Optional
external_ticket_stateThe state of the incident ticket in an external ticket handling system. Possible values are: New, Assigned, In Progress, Closed.Optional
external_assigned_userThe user that the external ticket is assigned to.Optional

Context Output#

There is no context output for this command.

Command Example#

!fortisiem-incident-update incident_id=102 comment=demo-comment

Human Readable Output#

The incident: 102 was successfully updated.

fortisiem-cmdb-devices-list#


List CMDB (Centralized Management Database) devices with short information for each device. If you provide one of the exclude arguments, their values are excluded from the provided include arguments. For example, to list all devices in the range 192.168.20.1-192.168.20.100, but exclude 192.168.20.20, 192.168.20.25, use include_ip_range='192.168.20.1-192.168.20.100' and exclude_ip='192.168.20.20, 192.168.20.25'. If no argument is provided, the command retrieves all devices.

Base Command#

fortisiem-cmdb-devices-list

Input#

Argument NameDescriptionRequired
include_ipComma-separated list of IP addresses to include. For example: 1.1.1.1,2.2.2.2.Optional
exclude_ipComma-separated list of IP addresses to exclude. For example: 1.1.1.1,2.2.2.2.Optional
include_ip_rangeRange of IP addresses to include. For example: 1.1.1.1-1.1.1.255.Optional
exclude_ip_rageRange of IP addresses to exclude. For example: 1.1.1.1-1.1.1.255.Optional
limitThe number of results to retrieve. Minimum value is 1. Default is 50.Optional
pageThe page number of the results to retrieve. Minimum value is 1. Default is 1.Optional

Context Output#

PathTypeDescription
FortiSIEM.Device.accessIpStringDevice Access IP.
FortiSIEM.Device.nameStringDevice name.
FortiSIEM.Device.naturalIdStringDevice unique ID.
FortiSIEM.Device.approvedUnknownWhether or not the device is approved.
FortiSIEM.Device.unmanagedUnknownWhether or not the device is unmanaged.
FortiSIEM.Device.deviceTypeUnknownDevice type.

Command Example#

!fortisiem-cmdb-devices-list limit=2 page=1

Context Example#

{
"FortiSIEM": {
"Device": [
{
"accessIp": "192.168.30.124",
"approved": "true",
"deviceType": {
"model": "FortiSIEM",
"vendor": "Fortinet",
"version": "ANY"
},
"name": "fortisiem.demo.co",
"naturalId": "fortisiem.demo.co",
"organization": {
"@id": "1",
"@name": "Super"
},
"unmanaged": "false"
},
{
"accessIp": "192.168.30.254",
"approved": "true",
"deviceType": {
"model": "PAN-OS",
"vendor": "Palo Alto",
"version": "ANY"
},
"name": "Palo Alto",
"naturalId": "HOST%2d192.168.30.254",
"organization": {
"@id": "1",
"@name": "Super"
},
"unmanaged": "false"
}
]
}
}

Human Readable Output#

List CMDB devices#

Showing page 1 out of 1 total pages. Current page size: 2.

NameAccess IpApprovedUnmanagedDevice Type
fortisiem.demo.co192.168.30.124truefalsevendor: Fortinet
model: FortiSIEM
version: ANY
Palo Alto192.168.30.254truefalsevendor: Palo Alto
model: PAN-OS
version: ANY

fortisiem-cmdb-device-get#


Retrieve full information of the specified devices.

Base Command#

fortisiem-cmdb-device-get

Input#

Argument NameDescriptionRequired
ipsComma-separated list of devices IP addresses.Required

Context Output#

PathTypeDescription
FortiSIEM.Device.accessIpStringDevice access IP.
FortiSIEM.Device.nameStringDevice name.
FortiSIEM.Device.naturalIdStringDevice unique ID.
FortiSIEM.Device.approvedUnknownWhether or not the device is approved.
FortiSIEM.Device.unmanagedUnknownWhether or not the device is unmanaged.
FortiSIEM.Device.deviceTypeUnknownDevice type.
FortiSIEM.Device.discoverMethodStringDevice discover method.
FortiSIEM.Device.discoverTimeDateWhen the device was discovered.
FortiSIEM.Device.unmanagedUnknownWhether or not the device is unmanaged.
FortiSIEM.Device.updateMethodUnknownThe update method of the device.

Command Example#

!fortisiem-cmdb-device-get ips=192.168.30.254

Context Example#

{
"FortiSIEM": {
"Device": {
"accessIp": "192.168.30.254",
"approved": "true",
"creationMethod": "LOG",
"deviceType": {
"accessProtocols": "TELNET,SSH",
"category": "Appliance",
"jobWeight": "10",
"model": "PAN-OS",
"vendor": "Palo Alto",
"version": "ANY"
},
"discoverMethod": "LOG",
"discoverTime": "2021-11-23T07:58:48",
"eventParserList": "0",
"name": "Palo Alto",
"naturalId": "HOST%2d192.168.30.254",
"organization": {
"@id": "1",
"@name": "Super"
},
"primaryContactUser": "0",
"secondaryContactUser": "0",
"status": "2",
"unmanaged": "false",
"updateMethod": "MANUAL",
"version": "ANY",
"winMachineGuid": null
}
}
}

Human Readable Output#

CMDB device 192.168.30.254#

NameAccess IpApprovedUnmanagedDevice TypeDiscover TimeDiscover Method
Palo Alto192.168.30.254truefalseaccessProtocols: TELNET,SSH
category: Appliance
jobWeight: 10
model: PAN-OS
vendor: Palo Alto
version: ANY
2021-11-23T07:58:48LOG

fortisiem-monitored-organizations-list#


List of monitored organizations in service provider deployments.

Base Command#

fortisiem-monitored-organizations-list

Input#

Argument NameDescriptionRequired
limitThe maximum number of organizations to return. Default is 50.Optional
pageThe page number of the results to retrieve. Minimum value is 1. Default is 1.Optional

Context Output#

PathTypeDescription
FortiSIEM.Organization.idStringOrganization ID.
FortiSIEM.Organization.nameStringOrganization name.
FortiSIEM.Organization.disabledStringWhether or not the organization is disabled.
FortiSIEM.Organization.domainIdStringDomain ID of the organization.
FortiSIEM.Organization.initializedUnknownWhether or not the organization is initialized.

Command Example#

!fortisiem-monitored-organizations-list limit=2 page=1

Context Example#

{
"FortiSIEM": {
"Organization": {
"collectors": {
"collector": [
"EventCollector$null",
"EventCollector$null"
]
},
"creationTime": "2021-11-23T06:58:49",
"custId": "0",
"custProperties": null,
"disabled": "false",
"domainId": "1",
"entityVersion": "1",
"id": "500003",
"initialized": "true",
"lastModified": "2021-11-23T06:59:01",
"name": "Super",
"ownerId": "0",
"xmlId": "Domain$Super"
}
}
}

Human Readable Output#

List Monitored Organizations#

Showing page 1 out of 1 total pages. Current page size: 2.

Domain IdNameCust IdCreation TimeLast ModifiedDisabled
1Super02021-11-23T06:58:492021-11-23T06:59:01false

fortisiem-event-list-by-incident#


List events by the specified incident ID.

Base Command#

fortisiem-event-list-by-incident

Input#

Argument NameDescriptionRequired
limitThe number of results to retrieve. Minimum value is 1. Default is 50.Optional
incident_idThe incident ID from which the events were triggered.Required
pageThe page number of the results to retrieve. Minimum value is 1. Default is 1.Optional

Context Output#

PathTypeDescription
FortiSIEM.Event.eventTypeStringFortiSIEM event type.
FortiSIEM.Event.idStringEvent ID.
FortiSIEM.Event.receiveTimeDateThe date when the event was received by FortiSIEM.
FortiSIEM.Event.attributesUnknownAdditional attributes of the event.
FortiSIEM.Event.nidStringEvent natural ID.
FortiSIEM.Event.indexNumberEvent index in the list.
FortiSIEM.Event.custIdNumberThe customer ID the event is related to.

Command Example#

!fortisiem-event-list-by-incident incident_id=102 limit=1 page=1

Context Example#

{
"FortiSIEM": {
"Event": {
"attributes": {
"Connection Id": "0",
"Destination Interface SNMP Index": 29034,
"Destination TCP/UDP Port": 53,
"Event ID": 9071234812238931000,
"Event Parse Status": 1,
"Event Receive Time": 1640085152000,
"Event Type": "ASA-Built-Conn",
"External Event Receive Protocol": "NetFlow",
"IP Protocol": 17,
"Organization ID": 1,
"Received Bytes64": 136,
"Received Packets64": 1,
"Relaying IP": "192.168.30.254",
"Reporting Device": "Palo Alto",
"Reporting IP": "192.168.30.254",
"Reporting Model": "ASA",
"Reporting Vendor": "Cisco",
"Source IP": "192.168.1.1",
"Source Interface SNMP Index": 29054,
"Source TCP/UDP Port": 52377,
"System Event Category": 4,
"Total Bytes64": 136,
"Total Flows": 0,
"Total Packets64": 1
},
"custId": 1,
"dataStr": {},
"eventAttributes": [],
"eventType": "ASA-Built-Conn",
"id": 9071234812238931000,
"incidentId": "102",
"index": 0,
"nid": "9071234812238930440",
"rawMessage": null,
"receiveTime": "2021-12-21T11:12:32"
}
}
}

Human Readable Output#

List Events Of incident: 102#

Showing page 1 out of others that may exist. Current page size: 1.

IdCust IdIndexEvent TypeReceive Time
907123481223893044010ASA-Built-Conn2021-12-21T11:12:32

fortisiem-watchlist-list#


List all watchlists from FortiSIEM database.

Base Command#

fortisiem-watchlist-list

Input#

Argument NameDescriptionRequired
limitThe maximum number of watchlists to return. Default is 50.Optional
entry_valueThe entry value. For example, IP address, username, URL, etc.Optional
pageThe page number of the results to retrieve. Minimum value is 1. Default is 1.Optional

Context Output#

PathTypeDescription
FortiSIEM.Watchlist.isCaseSensitiveBooleanWhether or not watchlist is considered case sensitive.
FortiSIEM.Watchlist.naturalIdStringWatchlist unique ID.
FortiSIEM.Watchlist.displayNameStringDisplay name.
FortiSIEM.Watchlist.descriptionStringWatchlist description.
FortiSIEM.Watchlist.valuePatternStringThe value pattern of the watchlist.
FortiSIEM.Watchlist.ageOutDateWatchlist expiration time.
FortiSIEM.Watchlist.topGroupBooleanWhether or not the watchlist is top group.
FortiSIEM.Watchlist.entriesUnknownThe entries in the watchlist group.
FortiSIEM.Watchlist.dataCreationTypeStringWatchlist data creation type.
FortiSIEM.Watchlist.valueTypeStringThe type of the values of the entries that reside in the watchlist.
FortiSIEM.Watchlist.nameStringWatchlist name.
FortiSIEM.Watchlist.idNumberWatchlist ID.

Command Example#

!fortisiem-watchlist-list limit=1 page=1

Context Example#

{
"FortiSIEM": {
"Watchlist": {
"ageOut": "1w",
"custId": 0,
"dataCreationType": null,
"description": "Accounts that lock out frequently",
"displayName": "Accounts Locked",
"entries": [
{
"ageOut": "Never",
"count": null,
"custId": 1,
"dataCreationType": null,
"description": null,
"entryValue": "PVVol_A001_A000356_POWER23",
"expiredTime": 0,
"firstSeen": null,
"id": 1059255,
"lastSeen": null,
"naturalId": "PVVol_A001_A000356_POWER23_1641924540972",
"state": "Enabled",
"triggeringRules": "Datastore Space Warning"
}
],
"id": 500496,
"isCaseSensitive": false,
"name": "PH_DYNLIST_ACCT_LOCKOUT",
"naturalId": "PH_DYNLIST_ACCT_LOCKOUT",
"topGroup": false,
"valuePattern": null,
"valueType": "STRING"
}
}
}

Human Readable Output#

List Watchlist Groups#

Showing page 1 out of 34 total pages. Current page size: 1.

IdNameDisplay NameDescriptionValue Type
500496PH_DYNLIST_ACCT_LOCKOUTAccounts LockedAccounts that lock out frequentlySTRING

fortisiem-watchlist-get#


Get watchlist by the specified watchlist or entry ID.

Base Command#

fortisiem-watchlist-get

Input#

Argument NameDescriptionRequired
watchlist_idsComma-separated list of watchlist group IDs.Optional
entry_idComma-separated list of entry IDs that reside in the watchlist.Optional

Context Output#

PathTypeDescription
FortiSIEM.Watchlist.isCaseSensitiveBooleanWhether or not watchlist is considered case sensitive.
FortiSIEM.Watchlist.naturalIdStringWatchlist unique ID.
FortiSIEM.Watchlist.displayNameStringWatchlist display name.
FortiSIEM.Watchlist.descriptionStringWatchlist description.
FortiSIEM.Watchlist.valuePatternUnknownWatchlist entries value pattern.
FortiSIEM.Watchlist.ageOutDateWatchlist expiration date.
FortiSIEM.Watchlist.topGroupBooleanWhether or not the watchlist is top group.
FortiSIEM.Watchlist.entriesUnknownWatchlist entries.
FortiSIEM.Watchlist.dataCreationTypeUnknownData creation type of watchlist.
FortiSIEM.Watchlist.valueTypeStringWatchlist entries value type.
FortiSIEM.Watchlist.nameStringWatchlist name.
FortiSIEM.Watchlist.idNumberWatchlist ID.

Command Example#

!fortisiem-watchlist-get watchlist_ids=500504

Context Example#

{
"FortiSIEM": {
"Watchlist": {
"ageOut": "1w",
"custId": 0,
"dataCreationType": null,
"description": "End nodes that are triggered violations - like visiting unauthorized websites, failed Anti-virus updates, P2P traffic etc",
"displayName": "Policy Violators",
"entries": [
{
"ageOut": "Never",
"count": 2,
"custId": 1,
"dataCreationType": "USER",
"description": "test-add-entry",
"entryValue": "10.10.10.10",
"expiredTime": 0,
"firstSeen": "2022-01-01T00:00:00",
"id": 1576443,
"lastSeen": "2022-01-10T00:00:00",
"naturalId": "10.10.10.10_1641772800000",
"state": "Enabled",
"triggeringRules": null
},
{
"ageOut": "Never",
"count": null,
"custId": 1,
"dataCreationType": null,
"description": null,
"entryValue": "1.1.1.1",
"expiredTime": 0,
"firstSeen": null,
"id": 1334351,
"lastSeen": null,
"naturalId": "1.1.1.1_1642502059988",
"state": "Enabled",
"triggeringRules": "Datastore Space Warning"
},
{
"ageOut": "Never",
"count": null,
"custId": 1,
"dataCreationType": null,
"description": null,
"entryValue": "1.1.1.2",
"expiredTime": 0,
"firstSeen": null,
"id": 1334352,
"lastSeen": null,
"naturalId": "1.1.1.2_1642502188543",
"state": "Enabled",
"triggeringRules": "Datastore Space Warning"
},
{
"ageOut": "Never",
"count": null,
"custId": 1,
"dataCreationType": null,
"description": null,
"entryValue": "169.254.230.24",
"expiredTime": 0,
"firstSeen": null,
"id": 1236150,
"lastSeen": null,
"naturalId": "169.254.230.24_1642502028914",
"state": "Enabled",
"triggeringRules": "Datastore Space Warning"
},
{
"ageOut": "Never",
"count": 10,
"custId": 1,
"dataCreationType": "USER",
"description": null,
"entryValue": "7.1.1.10",
"expiredTime": 0,
"firstSeen": "2021-10-07T10:09:29",
"id": 1236141,
"lastSeen": "2021-10-07T10:09:29",
"naturalId": "7.1.1.10_1633601369215",
"state": "Enabled",
"triggeringRules": "Datastore Space Warning"
}
],
"id": 500504,
"isCaseSensitive": false,
"name": "PH_DYNLIST_POL_VIOLATION_ISSUE",
"naturalId": "PH_DYNLIST_POL_VIOLATION_ISSUE",
"topGroup": false,
"valuePattern": null,
"valueType": "IP"
}
}
}

Human Readable Output#

Get Watchlist 500504#

IdNameDisplay NameDescriptionValue Type
500504PH_DYNLIST_POL_VIOLATION_ISSUEPolicy ViolatorsEnd nodes that are triggered violations - such as visiting unauthorized websites, failed Anti-Virus updates, P2P traffic, etc.IP

Watchlist Entries#

IdStateEntry ValueTriggering RulesCountFirst SeenLast Seen
1576443Enabled10.10.10.1022022-01-01T00:00:002022-01-10T00:00:00
1334351Enabled1.1.1.1Datastore Space Warning
1334352Enabled1.1.1.2Datastore Space Warning
1236150Enabled169.254.230.24Datastore Space Warning
1236141Enabled7.1.1.10Datastore Space Warning102021-10-07T10:09:292021-10-07T10:09:29

fortisiem-watchlist-add#


Add a watchlist group. You can also add an entry to the watchlist.

Base Command#

fortisiem-watchlist-add

Input#

Argument NameDescriptionRequired
descriptionWatchlist description.Optional
display_nameDisplay name for watchlist group.Required
is_case_sensitiveWhether entry values are case sensitive. Possible values are: false, true. Default is false.Optional
data_creation_typeWhich entity created the data. Possible values are: USER, SYSTEM. Default is USER.Optional
value_typeEntries value type. Possible values are: STRING, IP, NUMBER, DATE. Default is STRING.Optional
age_outThe time period after which items expire from the watchlist group if there is no activity during that time. For example, "3 days", "in 2 weeks", "1 month". By default, items never expire from the watchlist.Optional
entry_inclusiveWhether the entry is active. Possible values are: false, true. Default is true.Optional
entry_valueEntry value.Optional
entry_age_outThe time period after which entries expire from the watchlist group if there is no activity during that time. For example, "3 days", "in 2 weeks", "1 month". By default, entries never expire from the watchlist.Optional
entry_countEntry count.Optional
entry_first_seenThe first time the entry was seen (number, time unit. e.g., 12 hours, 7 days).Optional
entry_last_seenThe last time the entry was seen. For example, "3 days ago", "1 month", "2019-10-10T12:22:00", "2019-10-10".Optional
entry_trigger_rulesThe triggering rules associates with the entry. Should be a comma-separated list of rule names.Optional

Context Output#

PathTypeDescription
FortiSIEM.Watchlist.isCaseSensitiveBooleanWhether or not watchlist is considered case sensitive.
FortiSIEM.Watchlist.naturalIdStringWatchlist unique ID.
FortiSIEM.Watchlist.displayNameStringWatchlist display name.
FortiSIEM.Watchlist.descriptionStringWatchlist description.
FortiSIEM.Watchlist.valuePatternStringEntries value pattern.
FortiSIEM.Watchlist.ageOutStringWatchlist expiration date.
FortiSIEM.Watchlist.topGroupBooleanWhether or not the watchlist is top group.
FortiSIEM.Watchlist.entriesUnknownWatchlist entries.
FortiSIEM.Watchlist.dataCreationTypeStringThe entity that created the watchlist.
FortiSIEM.Watchlist.valueTypeStringThe value type of the entries in the watchlist.
FortiSIEM.Watchlist.nameStringWatchlist name.
FortiSIEM.Watchlist.idNumberWatchlist ID.

Command Example#

!fortisiem-watchlist-add display_name=readme-demo data_creation_type=SYSTEM description="readme-watchlist" value_type=IP

Context Example#

{
"FortiSIEM": {
"Watchlist": {
"ageOut": null,
"custId": 1,
"dataCreationType": "USER",
"description": "readme-watchlist",
"displayName": "readme-demo",
"entries": null,
"id": 1244296,
"isCaseSensitive": false,
"name": "PH_SYS_Group_DyWatchList_1644929683070",
"naturalId": "PH_SYS_Group_DyWatchList_1644929683070",
"topGroup": false,
"valuePattern": null,
"valueType": "IP"
}
}
}

Human Readable Output#

Added new Watchlist group: readme-demo#

idnamedisplayNamedescriptionvalueType
1244296PH_SYS_Group_DyWatchList_1644929683070readme-demoreadme-watchlistIP

fortisiem-watchlist-entry-add#


Add watchlist entry to one or more watchlist groups.

Base Command#

fortisiem-watchlist-entry-add

Input#

Argument NameDescriptionRequired
watchlist_idThe watchlist ID to add the entry to.Required
inclusiveWhether or not the entry is active. Possible values are: false, true. Default is true.Optional
countEntry count.Optional
triggering_rulesThe triggering rules associated with the entry. Should be a comma-separated list of rules names.Optional
valueThe entry value.Required
age_outThe time period after which the entry expires from the watchlist group if there is no activity during that time. For example, "3 days", "in 2 weeks", "1 month". By default, entries never expire from the watchlist.Optional
last_seenThe last time the entry was seen. For example, "3 days ago", "1 month", "2019-10-10T12:22:00", "2019-10-10".Optional
first_seenThe first time the entry was seen. For example, "3 days ago", "1 month", "2019-10-10T12:22:00", "2019-10-10".Optional
data_creation_typeWhich entity created the data. Possible values are: USER, SYSTEM. Default is USER.Optional
descriptionEntry description.Optional

Context Output#

There is no context output for this command.

Command Example#

!fortisiem-watchlist-entry-add value=10.10.10.10 watchlist_id=500504 count=2 description=test-add-entry first_seen=2022-01-01 last_seen=2022-01-10

Human Readable Output#

Successfully added Entry: 10.10.10.10 to Watchlist: 500504.

fortisiem-watchlist-entry-update#


Update watchlist entry. This command overrides all existing values in the entry's attribute. Fill in all relevant arguments to avoid deletion of data.

Base Command#

fortisiem-watchlist-entry-update

Input#

Argument NameDescriptionRequired
data_creation_typeWhich entity created the data. Possible values are: USER, SYSTEM. Default is USER.Optional
first_seenThe first time the entry was seen. For example, "3 days ago", "1 month", "2019-10-10T12:22:00", "2019-10-10".Optional
countEntry count.Optional
triggering_rulesThe triggering rules associated with the entry. Should be a comma-separated list of rules names.Optional
descriptionEntry description.Optional
entry_idThe ID of the entry to update.Required
inclusiveWhether the entry is active. Possible values are: false, true. Default is true.Optional
valueThe entry value.Required
expired_timeWhen the entry was expired (number, time unit. e.g, 12 hours, 7 days).Optional
age_outThe time period after which the entry expires from the watchlist group if there is no activity during that time. For example, "3 days ago", "in 2 weeks", "1 month". By default, the item never expires from the watchlist.Optional
last_seenThe first time the entry was seen. For example, "3 days", "1 month", "2019-10-10T12:22:00", "2019-10-10".Optional

Context Output#

PathTypeDescription
FortiSIEM.WatchlistEntry.lastSeenDateThe last time the entry was seen.
FortiSIEM.WatchlistEntry.naturalIdStringEntry unique ID.
FortiSIEM.WatchlistEntry.dataCreationTypeStringEntry data creation type.
FortiSIEM.WatchlistEntry.firstSeenDateThe first time the entry was seen.
FortiSIEM.WatchlistEntry.countNumberThe number of times the entry was seen.
FortiSIEM.WatchlistEntry.triggeringRulesStringThe triggering rules associated with the entry.
FortiSIEM.WatchlistEntry.descriptionStringEntry description.
FortiSIEM.WatchlistEntry.idNumberEntry ID.
FortiSIEM.WatchlistEntry.stateStringEntry state.
FortiSIEM.WatchlistEntry.entryValueStringEntry value.
FortiSIEM.WatchlistEntry.expiredTimeDateWhen the entry was expired.
FortiSIEM.WatchlistEntry.ageOutStringExpiration date of the entry.

Command Example#

!fortisiem-watchlist-entry-update entry_id=1488255 value=5.5.5.7 count=5

Context Example#

{
"FortiSIEM": {
"WatchlistEntry": {
"ageOut": "Never",
"count": 5,
"custId": 1,
"dataCreationType": "USER",
"description": null,
"entryValue": "5.5.5.7",
"expiredTime": 0,
"firstSeen": null,
"id": 1488255,
"lastSeen": null,
"naturalId": "5.5.5.7_1644916470062",
"state": "Enabled",
"triggeringRules": null
}
}
}

Human Readable Output#

Successfully Updated Entry: 1488255.#

IdStateEntry ValueTriggering RulesCountFirst SeenLast Seen
1488255Enabled5.5.5.75

fortisiem-watchlist-entry-delete#


Delete entry of watchlist.

Base Command#

fortisiem-watchlist-entry-delete

Input#

Argument NameDescriptionRequired
entry_idsComma-separated list of entry IDs to delete.Required

Context Output#

There is no context output for this command.

Command Example#

!fortisiem-watchlist-entry-delete entry_ids=1488255

Human Readable Output#

The entry 1488255 were deleted successfully.

fortisiem-watchlist-delete#


Delete watchlist.

Base Command#

fortisiem-watchlist-delete

Input#

Argument NameDescriptionRequired
watchlist_idComma-separated list of watchlist IDs to delete.Required

Context Output#

There is no context output for this command.

Command Example#

!fortisiem-watchlist-delete watchlist_id=1244273

Human Readable Output#

The watchlist 1244273 was deleted successfully.

fortisiem-watchlist-entry-get#


Get entry by the specified entry ID.

Base Command#

fortisiem-watchlist-entry-get

Input#

Argument NameDescriptionRequired
entry_idsComma-separated list of entry IDs.Required

Context Output#

PathTypeDescription
FortiSIEM.WatchlistEntry.lastSeenDateThe last time the entry was seen.
FortiSIEM.WatchlistEntry.naturalIdStringEntry unique ID.
FortiSIEM.WatchlistEntry.dataCreationTypeStringEntry data creation type.
FortiSIEM.WatchlistEntry.firstSeenDateThe first time the entry was seen.
FortiSIEM.WatchlistEntry.countNumberThe number of times the entry was seen.
FortiSIEM.WatchlistEntry.triggeringRulesStringThe triggering rules associated with the entry.
FortiSIEM.WatchlistEntry.descriptionStringEntry description.
FortiSIEM.WatchlistEntry.idNumberEntry ID.
FortiSIEM.WatchlistEntry.stateStringEntry state.
FortiSIEM.WatchlistEntry.entryValueStringEntry value.
FortiSIEM.WatchlistEntry.expiredTimeDateWhen the entry was expired.
FortiSIEM.WatchlistEntry.ageOutStringExpiration date of the entry.

Command Example#

!fortisiem-watchlist-entry-get entry_ids=1576423

Context Example#

{
"FortiSIEM": {
"WatchlistEntry": {
"ageOut": "1w",
"count": 1,
"custId": 1,
"dataCreationType": null,
"description": null,
"entryValue": "192.168.91.3",
"expiredTime": "2022-02-20T10:42:30",
"firstSeen": "2022-01-04T12:43:00",
"id": 1576423,
"lastSeen": "2022-02-13T10:42:30",
"naturalId": "192.168.91.3_1644748950000",
"state": "Enabled",
"triggeringRules": "Sudden Increase in ICMP Requests From A Host"
}
}
}

Human Readable Output#

Get Watchlist Entry: 1576423#

IdStateEntry ValueTriggering RulesCountFirst SeenLast Seen
1576423Enabled192.168.91.3Sudden Increase in ICMP Requests From A Host12022-01-04T12:43:002022-02-13T10:42:30

fortisiem-event-search-results#


The results of the specified search ID.

Base Command#

fortisiem-event-search-results

Input#

Argument NameDescriptionRequired
search_idThe ID of the search query to retrieve its results.Required
limitMaximum number of results to return. Default is 50.Optional
pageThe page number to retrieve. Default is 1.Optional

Context Output#

PathTypeDescription
FortiSIEM.Event.custIdNumberThe customer ID the event is related to.
FortiSIEM.Event.indexNumberThe position number of the event in the results.
FortiSIEM.Event.idStringEvent ID.
FortiSIEM.Event.eventTypeStringThe event type.
FortiSIEM.Event.receiveTimeDateWhen the event was received in UTC time.
FortiSIEM.Event.nidStringThe event ID.
FortiSIEM.Event.attributesUnknownAdditional attributes of the event.

Breaking changes from the previous version of this integration - FortiSIEM v2#

The following sections list the changes in this version.

Commands#

The following commands were removed in this version:#

fortisiem-get-events-by-incident - this command was replaced by fortisiem-event-list-by-incident. fortisiem-clear-incident - this command was replaced by fortisiem-incident-update. fortisiem-get-events-by-filter - this command was replaced by fortisiem-event-search-status. fortisiem-get-cmdb-devices - this command was replaced by fortisiem-cmdb-devices-list. fortisiem-get-events-by-query - this command was replaced by fortisiem-event-search-status. fortisiem-get-lists . fortisiem-add-item-to-resource-list. fortisiem-remove-item-from-resource-list. fortisiem-get-resource-list.

Additional Considerations for this version#

The following commands were added in this version:#

fortisiem-watchlist-list fortisiem-watchlist-get fortisiem-watchlist-add fortisiem-watchlist-entry-add fortisiem-watchlist-entry-update fortisiem-watchlist-delete fortisiem-watchlist-entry-delete fortisiem-watchlist-entry-get

Fetch incidents command can fetch also triggered events.#