FortiAnalyzer Device Integration

Modified on Thu, 12 Mar at 1:05 PM

TABLE OF CONTENTS


Overview

We are providing the steps to integrate your FortiAnalyzer with ADR SIEM to achieve comprehensive visibility and proactive threat detection in your environment. Logs will be transferred from your firewall to the APE (Analytics and Policy Engine) via the CCE (Collection and Control Engine). This document guides you through the log forwarding configuration.


Configuration Steps

  1. Log in to the FortiAnalyzer.
  2. Navigate to System Settings → Advanced → Syslog Server.
  3. Click Create New in the toolbar. The Create New Syslog Server Settings pane will open.
  4. Configure the following settings:
    • Name: Enter a name for the Syslog server (e.g., ADR CCE).
    • IP Address (or FQDN): Enter the IP or FQDN of the CCE Syslog server.
    • Port: Enter the Syslog server port (default: 514).
  5. To add the Syslog server, complete the form and click OK.
  6. Configure local log forwarding using the CLI:
    config system locallog syslogd setting
        set severity debug
        set status enable
        set syslog-name <syslog server name>
    end
        


Verification of Configuration

Verification can be performed from either the CCE server or the GUI.


From the GUI

  1. Log in to the GUI with Administrator access and navigate to System → Log/Flow Collection Status.
  2. Inside SOURCE DEVICE IP, the device IP should appear.


From the CCE Server

To verify from the CCE server, log in using your credentials and run the following command:

sudo tcpdump -i any host 514 and host <IP address> -50 -AAA


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article