Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fortigate logs to Elastic SIEM App #16

Closed
Cyb3rSn0rlax opened this issue May 7, 2020 · 5 comments
Closed

Fortigate logs to Elastic SIEM App #16

Cyb3rSn0rlax opened this issue May 7, 2020 · 5 comments

Comments

@Cyb3rSn0rlax
Copy link
Contributor

Hello,
ECS version: 1.5
Elastic stack 7.6.2

I don't know why I am finding this repo until today, such a great work.
I haven't tried this mapping yet since I created my own but I noticed that if you want this to work with Elastic SIEM to have a more complete and centralized visibility with other firewall/endpoint logs, you would need to change/add few things :

  • The Timeline Event Renderer won't give you this view :

image

Instead you would have flat events. This is because of the even.category is set to network even though that this is what is recommended in the documentation but I had to change it to network_traffic to get the event renderer working for my fortigate logs.

More info in this reddit thread here

  • If you want to see top source and destination countries on the Network panel of your Elastic SIEM app you would need to use the GeoIP processor of an ingest node and not logstash, since the one logstash uses is not ecs friendly because it creates a country_code1 or country_code2... etc instead of country_iso_code which the one inspected by Elastic SIEM . From the kibana developper panel create an ingest pipeline :
PUT _ingest/pipeline/geoip-info-fortinet
{
    "description": "Add geoip info",
    "processors": [
        {
            "geoip": {
                "field": "srcip",
                "target_field": "source.geo"
            }
        },
        {
            "geoip": {
                "field": "dstip",
                "target_field": "destination.geo"
            }
        }
    ]
}

Make sure that the node you creating this into is an node.ingest : true

Hope it helps someone and thanks for the great work.

@enotspe
Copy link
Owner

enotspe commented May 8, 2020

Hi @H1L021 , thanks for the suggestion for network_traffic !!! I spent quite some time trying to figure out how to make it work on SIEM. I will add it to even.category as suggested

About geo field names, the pipeline geo_enrichment already handles it so those fields show up on SIEM UI.

    #rename iso code fields to match ECS
    mutate { 
        remove_field => ["src_ip_geo_apply", "dest_ip_geo_apply" ] 
        rename => { "[source][geo][country_code2]" => "[source][geo][country_iso_code]" }
        rename => { "[destination][geo][country_code2]" => "[destination][geo][country_iso_code]" }
        rename => { "[source][geo][region_code]" => "[source][geo][region_iso_code]" }
        rename => { "[destination][geo][region_code]" => "[destination][geo][region_iso_code]" }

@Cyb3rSn0rlax
Copy link
Contributor Author

Thank you, my bad didn't see it. Sorry

@enotspe enotspe closed this as completed May 8, 2020
@enotspe
Copy link
Owner

enotspe commented May 8, 2020

3af76bd

@fredtj
Copy link

fredtj commented Jul 6, 2020

looks like network_traffic is depreciated as of 8.0.0 - see here elastic/beats#19039

perhaps the real issue is the timeline event renderer needs to be updated?

@enotspe
Copy link
Owner

enotspe commented Jul 6, 2020

yeah. That is why I left this line commented

#add_field => { "[event][category]" => "network" } this should be the correct value once SIEM UI gets aligned with ECS event.category allowed values

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants