Alerts not generated despite matching FortiGate logs and Sigma rules #15125
-
Version2.4.141 Installation MethodSecurity Onion ISO image Descriptionother (please provide detail below) Installation TypeStandalone Locationon-prem with Internet access Hardware SpecsExceeds minimum requirements CPU8 RAM32 Storage for /500 Storage for /nsm326 Network Traffic Collectionother (please provide detail below) Network Traffic Speeds1Gbps to 10Gbps StatusYes, all services on all nodes are running OK Salt StatusNo, there are no failures LogsNo, there are no additional clues DetailI’m currently testing FortiGate logs integration with Security Onion. The logs are successfully received and parsed — as shown in the attached dashboard screenshot — and I can confirm that the log fields match the conditions specified in my Sigma rules. Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 5 replies
-
|
When you convert in the custom rule and |
Beta Was this translation helpful? Give feedback.
I see it, shouldn't your logsource be
product: fortinetandcategory: firewall?https://sigmahq.io/docs/basics/log-sources.html
Have you tried breaking up into two selections (selection1 and selection2) and setting the condition as selection1 and selection2?