Loading

Fortinet FortiEDR Integration

<div class="condensed-table">
| | |
| --- | --- |
| Version | 1.15.1 (View all) |
| Compatible Kibana version(s) | 7.17.0 or higher
8.0.0 or higher |
| Supported Serverless project types
What’s this? | Security
Observability |
| Subscription level
What’s this? | Basic |
| Level of support
What’s this? | Elastic |

</div>
This integration is for Fortinet FortiEDR logs sent in the syslog format.

The Fortinet FortiEDR integration requires that the Send Syslog Notification option be turned on in the FortiEDR Playbook policy that includes the devices that are to be monitored by the integration, and a syslog export must be defined.

  1. In Fortinet console, navigate to Administration > Export Settings
  2. Fill in details for the target syslog server. See the Administration Guide syslog documentation for details.
  1. Navigate to Security Settings > Playbooks.
  2. In notifications for the playbook being used, set appropriate Send Syslog Notification options for the events to be collected. See Automated Incident Response - Playbooks Page.

The log dataset collects Fortinet FortiEDR logs.