Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Please provide the below information so we can validate before merging:
1: Yes it does.
2: Documentation and screenshots will be provided to Kostas directly.
3: It does not look like Fortinet exposes the event schema(s) of the telemetry that is collected through their product.
Type of change
Please delete options that are not relevant.
How Has This Been Tested?
Please describe the tests that you ran to verify your changes. Provide instructions so we can reproduce. Please also list any relevant details for your test configuration.
Test Configuration:
Checklist:
Additional Information
FortiEDR can be seen as some kind of dual EDR/SIEM agent. The main reason being that, in the Collection profile which defines what telemetry (event types) is captured by the agent, there is the option to enable a "Event Log Entry Created" type.
As far as I can see, this basically enable SIEM collection on the agent, with a LOT of Windows Event Logs being created. For instance:
All events that "matches" the edr-telemetry project sub-categories. However, the caveat here is that the FortiEDR agent just collects too much from that setting alone. Which means that it most likely collect Event IDs that are ENABLED at the Windows level and it does not enable them itself.
Therefore, in order to actually collect these events, the "Event Log Entry Created" type needs to be enabled in the Collection profile AND the target Event ID(s) must be configured on Windows. This would be true for the following sub-category:
Since all these sub-categories can be covered by known/existing Event IDs in Windows. Therefore, the "Partially" reason could be something like:
Obtained through Event Logs by enabling their collection in FortiEDR's Collection profile
2024/11/16 - Initial version of this PR. May go through some modifications following discussion and/or comments and suggestions!