Fortinet FortiGate Cloud Device
Configure a Fortinet FortiGate cloud device to pull IOCs from Threat Command.
FortiGate v6.2 or later is supported.
The following table shows IOC pull characteristics:
Characteristic | Description |
---|---|
Method of pull | All new IOCs that were discovered since the previous update are pulled. |
IOC types | Domains, IP addresses, and file hashes (MD5, SHA-1, and SHA-256). |
IOC group limitation | Each IOC group can contain only one type of IOC. For multiple types, create multiple IOC groups. |
Device IOC limit | The device is limited to 100,000 IOCs. |
Imported IOCs are accepted/monitored. You can create a policy to block those IOCs.
You must first add the device to Threat Command and then configure the device to pull IOCs from Threat Command.
Add a Fortinet FortiGate cloud device
Add a cloud device to Threat Command.
Prerequisites
- You have the credentials to access the device.
- You have administrative credentials to access Threat Command with a subscription to the Automation and TIP modules.
To add a cloud device to Threat Command:
- Log in to Threat Command at https://dashboard.ti.insight.rapid7.com
- From the main menu, select Automation -> Integrations.
- From the Integrations page, click Cloud.
- Click Add new device.
- In the Add New Cloud Device dialog, type a user-defined name for the device.
The name can contain a maximum of 50 letters, spaces, numbers, and underscores. - Select the Device type.
The default device IOCs limit is displayed. - (Optional) You can change the IOCs limit.
- Click Add.
- To verify that the new device is added, refresh the Automation > Integrations page.
The new device is added to the cloud integrations device list. Next to the device name, there is a red dot, indicating that communication has not yet been established. The dot will change to green when the device is synchronized. If the device cannot synchronize for more than 48 hours, an email warning is sent to the account administrator.
Configure a Fortinet FortiGate device to pull IOCs
After a device has been added, you must enable it to pull IOCs from Threat Command.
In FortiGate, you must create a separate fabric connector for each IOC group.
By default, IOCs are accepted/monitored. To block IOCs, you will need to edit the policy,
Prerequisites
- You have the device login credentials.
- The device has been added.
- You have administrative credentials to access Threat Command with a subscription to the Automation and TIP modules.
- An IOC group for this device exists in Threat Command.
Creating IOC groups is described in Create an IOC group
- You have the Threat Command account ID and appliance key, as described in API key, account ID, and appliance key.
To configure a FortiGate on-premises device:
- From Threat Command, copy the Fortinet FortiGate IOC group URL into the Fortinet FortiGate:
- Log in to the Fortinet FortiGate.
- Navigate to Security Fabric > Fabric Connectors.
- Click Create New.
The New Fabric Connector page is displayed. - In the Threat Feeds section, select a feed option that matches the IOC type in Threat Command IOC group (IP Address, Domain Name, or Malware Hash):
The New Fabric Connector dialog is displayed: - In the New Fabric Connector dialog, fill the fields, as follows:
Field | Description |
---|---|
Name | Type a user-defined name. This name is used to identify IOCs imported from this group. |
URI of external resource | Paste in the URL from the Threat Command IOC Group URL dialog. |
HTTP basic authentication | In the Username field, paste the Threat Command account ID. In the Password field, paste the Threat Command appliance key. You can retrieve this information, as described in API key, account ID, and appliance key. |
Refresh Rate | (Optional) You can change the refresh rate (default: 5 minutes). |
Comments | Optional |
- Click OK.
The new threat feed is displayed in the Threat Feeds page: Initially, the arrow is red and pointing downwards. When it is synchronized it is green, pointing up.
This process is the same for all forms of threat feeds. - Repeat this process for every IOC group to be imported.
See imported IOCs
You can see the IOCs that are imported into FortiGate. The following procedure works the same for all forms of threat feeds.
To see imported IOCs in FortiGate:
- From FortiGate, navigate to Security Fabric> Fabric Connectors.
- Click a threat feed.
Its details are displayed. - Click View Entries.
The imported IOCs are displayed:
Block imported IOCs
By default, imported IOCs are accepted/monitored. You can create a policy to block both incoming and outgoing communication with the IP address IOCs.
To create a policy to block IOCs: