From 9401842eee40bef1f75289d0b605739d1f79b4ad Mon Sep 17 00:00:00 2001 From: AlfonsoRBJ Date: Fri, 22 Jun 2018 17:08:14 +0200 Subject: [PATCH 1/9] fix the issue #137 We've adjusted the fortigate decoders so you can generate alerts when you receive events in a new format. --- decoders/0100-fortigate_decoders.xml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/decoders/0100-fortigate_decoders.xml b/decoders/0100-fortigate_decoders.xml index 8d532e71f..627d42a43 100644 --- a/decoders/0100-fortigate_decoders.xml +++ b/decoders/0100-fortigate_decoders.xml @@ -54,7 +54,7 @@ Feb 20 12:31:11 date=2011-02-20 time=12: 31:09 devname=Name_of_Device device_id= - date=\S+ time=\.+ devname=\S+ devid=FG\w+ logid=\d+ + date=\S+ time=\.+ devname=\S+ devid=FG\w+ logid=\d+ |date=\S+ time=\.+ devname="\S+" devid="FG\w+" logid="\d+" syslog @@ -108,8 +108,8 @@ date=2016-06-16 time=16:22:34 devname=Mobipay_Firewall devid=FGTXXXX9999999999 l --> fortigate-firewall-v5 - type=event subtype=system level=information - user="(\S+)" ui=\p*\w+\((\S+)\)\p* action=(\S+) + type=event subtype=system level=information|type="event" subtype="system" level="information" + user="(\S+)" ui=\p*\w+\((\S+)\)\p* action=(\S+) |user="(\S+)" ui=\p*\w+\((\S+)\)\p* \.*action="(\S+)" srcuser,srcip,action @@ -121,7 +121,7 @@ date=2016-06-16 time=16:22:34 devname=Mobipay_Firewall devid=FGTXXXX9999999999 l fortigate-firewall-v5 - status=(\S+) \.*msg=(\.*) + status=(\S+) \.*msg=(\.*)|status="(\S+)" \.*msg=(\.*) status,extra_data From 2aa2fc7d84bf52cf4999f71cc58be79922c7567d Mon Sep 17 00:00:00 2001 From: frgv <36547287+frgv@users.noreply.github.com> Date: Mon, 25 Jun 2018 15:24:29 +0200 Subject: [PATCH 2/9] Fortigate - Decoders and rules fixed Fixed fortigate decoders and rules to decode new fortigate format. GPDR tagging still needed. --- decoders/0100-fortigate_decoders.xml | 426 ++++++++++++++++++++++++--- rules/0390-fortigate_rules.xml | 148 ++++++++-- 2 files changed, 503 insertions(+), 71 deletions(-) diff --git a/decoders/0100-fortigate_decoders.xml b/decoders/0100-fortigate_decoders.xml index 627d42a43..a297c821e 100644 --- a/decoders/0100-fortigate_decoders.xml +++ b/decoders/0100-fortigate_decoders.xml @@ -54,32 +54,107 @@ Feb 20 12:31:11 date=2011-02-20 time=12: 31:09 devname=Name_of_Device device_id= - date=\S+ time=\.+ devname=\S+ devid=FG\w+ logid=\d+ |date=\S+ time=\.+ devname="\S+" devid="FG\w+" logid="\d+" + date=\S+\.+time=\.+devname=\S+\.+devid=\p*FG\S+\.+logid= syslog + + + fortigate-firewall-v5 + type=utm,subtype=ips|type=utm subtype=ips|type="utm" subtype="ips" + \.*severity="(\S+)"|\.*severity=(\S+),|\.*severity=(\S+) + status + + fortigate-firewall-v5 - type=utm subtype=ips - severity=(\S+) srcip=(\S+) dstip=(\S+) \.*action=(\S+) proto\.+srcport=(\d+) dstport=(\d+) \.*msg=(\.*) - status,srcip,dstip,action,srcport,dstport,extra_data + \.*srcip="(\S+)"|\.*srcip=(\S+),|\.*srcip=(\S+) + srcip + + fortigate-firewall-v5 + \.*dstip="(\S+)"|\.*dstip=(\S+),|\.*dstip=(\S+) + dstip + + + + fortigate-firewall-v5 + \.*action="(\S+)"|\.*action=(\S+),|\.*action=(\S+) + action + + + + fortigate-firewall-v5 + \.*srcport="(\d+)"|\.*srcport=(\d+),|\.*srcport=(\d+) + srcport + + + + fortigate-firewall-v5 + \.*dstport="(\d+)"|\.*dstport=(\d+),|\.*dstport=(\d+) + dstport + + + + fortigate-firewall-v5 + \.*msg="(\.+)"|\.*dstport=(\.+),|\.*dstport=(\.+) + extra_data + + + + + + + + + + fortigate-firewall-v5 + type="anomaly"|type=anomaly + \.*severity="(\S+)"|\.*severity=(\S+),|\.*severity=(\S+) + status + + + + fortigate-firewall-v5 + \.*srcip="(\S+)"|\.*srcip=(\S+),|\.*srcip=(\S+) + srcip + + + + fortigate-firewall-v5 + \.*dstip="(\S+)"|\.*dstip=(\S+),|\.*dstip=(\S+) + dstip + + fortigate-firewall-v5 - type=anomaly - severity=(\w+) srcip=(\S+) dstip=(\S+) srcintf=\S+ sessionid=\S+ action=(\w+) proto=\d+ service=(\S+) count=\d+ (attack)="(\.+)" - status, srcip, dstip, action, protocol, id, extra_data + \.*action="(\S+)"|\.*action=(\S+),|\.*action=(\S+) + action + + fortigate-firewall-v5 + \.*service="(\S+)"|\.*service=(\S+),|\.*service=(\S+) + service + + + + fortigate-firewall-v5 + \.*(attack)="(\S+)"|\.*(attack)=(\S+),|\.*(attack)=(\S+) + id, extra_data + + + fortigate-firewall-v5 - type=utm subtype=webfilter - level=(\S+) \.+ user="(\.*)" srcip=(\S+) srcport=(\d+) \.+ dstip=(\S+) dstport=(\d+) \.+ hostname="(\.+)" \.+ action=(\w+) - status,srcuser,srcip,srcport,dstip,dstport,url,action + type=utm subtype=webfilter|type=utm,subtype=webfilter|type="utm" subtype="webfilter" + \.*level="(\S+)"|\.*level=(\S+),|\.*level=(\S+) + status + + + + fortigate-firewall-v5 + \.*user="(\.*)"|\.*user=(\.*),|\.*user=(\.*) + srcuser + + + + fortigate-firewall-v5 + \.*srcip="(\S+)"|\.*srcip=(\S+),|\.*srcip=(\S+) + srcip + + + + fortigate-firewall-v5 + \.*srcport="(\d+)"|\.*srcport=(\d+),|\.*srcport=(\d+) + srcport + + + + fortigate-firewall-v5 + \.*dstip="(\S+)"|\.*dstip=(\S+),|\.*dstip=(\S+) + dstip + + + + fortigate-firewall-v5 + \.*dstport="(\d+)"|\.*dstport=(\d+),|\.*dstport=(\d+) + dstport + + + + fortigate-firewall-v5 + \.*hostname="(\.+)"|\.*hostname=(\.+),|\.*hostname=(\.+) + url + + + + fortigate-firewall-v5 + \.*action="(\S+)"|\.*action=(\S+),|\.*action=(\S+) + action + + + + + + fortigate-firewall-v5 + type=utm subtype=app-ctrl|type=utm,subtype=app-ctrl|type="utm" subtype="app-ctrl" + \.*level="(\S+)"|\.*level=(\S+),|\.*level=(\S+) + status + + fortigate-firewall-v5 + \.*user="(\.*)"|\.*user=(\.*),|\.*user=(\.*) + srcuser + + + + fortigate-firewall-v5 + \.*srcip="(\S+)"|\.*srcip=(\S+),|\.*srcip=(\S+) + srcip + + + + fortigate-firewall-v5 + \.*srcport="(\d+)"|\.*srcport=(\d+),|\.*srcport=(\d+) + srcport + + + + fortigate-firewall-v5 + \.*dstip="(\S+)"|\.*dstip=(\S+),|\.*dstip=(\S+) + dstip + + + + fortigate-firewall-v5 + \.*dstport="(\d+)"|\.*dstport=(\d+),|\.*dstport=(\d+) + dstport + + + + fortigate-firewall-v5 + \.*action="(\S+)"|\.*action=(\S+),|\.*action=(\S+) + action + + + + fortigate-firewall-v5 + \.*hostname="(\.+)"|\.*hostname=(\.+),|\.*hostname=(\.+) + url + + + + fortigate-firewall-v5 - type=event subtype=system level=information|type="event" subtype="system" level="information" - user="(\S+)" ui=\p*\w+\((\S+)\)\p* action=(\S+) |user="(\S+)" ui=\p*\w+\((\S+)\)\p* \.*action="(\S+)" - srcuser,srcip,action + type=event subtype=system level=information|type=event,subtype=system,level=information|type="event" subtype="system" level="information" + \.*user="(\S+)"|\.*user(\S+) + srcuser fortigate-firewall-v5 - cfgtid=(\d+) \.*cfgattr=(\.*) msg=(\.*) - id,url,extra_data + ui=\p*\w+\((\S+)\)\p* + srcip fortigate-firewall-v5 - status=(\S+) \.*msg=(\.*)|status="(\S+)" \.*msg=(\.*) - status,extra_data + \.*action="(\S+)"|\.*action=(\S+) + action + + fortigate-firewall-v5 + \.*cfgtid="(\d+)"|\.*cfgtid=(\d+) + id + + + + fortigate-firewall-v5 + \.*cfgattr="(\.*)"|\.*cfgattr=(\.*) + url + + + + fortigate-firewall-v5 + \.*ip="(\S+)"|\.*ip=(\S+) + src_ip + + + + fortigate-firewall-v5 + \.*srcip="(\S+)"|\.*srcip=(\S+) + src_ip + + + + fortigate-firewall-v5 + \.*status="(\S+)"|\.*status=(\S+) + status + + + + fortigate-firewall-v5 + msg="(\.*)"|,msg=(\.*) + extra_data + + + + + + fortigate-firewall-v5 - type=event subtype=system level=alert vd="\S+" logdesc="\.+" sn=\S+ - user="(\S+)" ui=\w+\((\S+)\) action=(\S+) status=(\S+) reason="\.+" msg="(\.+)"$ - user,srcip,action,status,extra_data + type=event subtype=system level=alert|type=event,subtype=system,level=alert|type="event" subtype="system" level="alert" + \.*user="(\S+)"|\.*user=(\S+),|\.*user=(\S+) + srcuser - - + fortigate-firewall-v5 - type=event subtype=system level=alert vd="\S+" logdesc="\.+" user= - "(\.+)" ui=\w+\((\S+)\) msg="(\.+)" - user,srcip,extra_data + \.*action="(\S+)"|\.*action=(\S+),|\.*action=(\S+) + action - - + + fortigate-firewall-v5 + \.*status="(\S+)"|\.*status=(\S+),|\.*status=(\S+) + status + + + fortigate-firewall-v5 - type=event subtype=system level=alert vd="\S+" logdesc="\.+" ui= - (\S+) action=(\S+) status=(\S+) reason=\S+ msg="(\.+)" - srcip,action,status,extra_data + \.*msg="(\.+)"|\.*msg=(\.+),|\.*msg=(\.+) + extra_data + fortigate-firewall-v5 type=event subtype=vpn level=\S+ vd="\.+" logdesc="\.+" msg="\.+" action= logdesc="(\.+)" msg=\.+ action=(\.*) remip=(\S+) locip=(\S+) \.+ status=(\S+) extra_data,action,dstip,srcip,status +--> + + + + + fortigate-firewall-v5 + type=event subtype=vpn|type="event" subtype="vpn"|type=event,subtype=vpn + \.*logdesc="(\.+)" + extra_data + + + + fortigate-firewall-v5 + \.*action="(\S+)"|\.*action=(\S+),|\.*action=(\S+) + action + + + + fortigate-firewall-v5 + \.*remip="(\S+)"|\.*remip=(\S+),|\.*remip=(\S+) + dstip + + + + fortigate-firewall-v5 + \.*locip="(\S+)"|\.*locip=(\S+),|\.*locip=(\S+) + srcip + + + + fortigate-firewall-v5 + \.*status="(\S+)"|\.*status=(\S+),|\.*status=(\S+) + status + fortigate-firewall-v5 @@ -189,7 +437,107 @@ date=2016-06-16 time=10:49:08 devname=Device_Name devid=FGTXXXX9999999999 logid= --> fortigate-firewall-v5 - type=traffic - srcip=(\S+) srcport=(\d+) \.+ dstip=(\S+) dstport=(\d+) \.+ appcat="(\.+)" apprisk=(\w+) applist= - srcip,srcport,dstip,dstport,protocol,status + type=traffic|type="traffic" + \.*srcip="(\S+)"|\.*srcip=(\S+),|\.*srcip=(\S+) + srcip + + + + fortigate-firewall-v5 + \.*srcport="(\d+)"|\.*srcport=(\d+),|\.*srcport=(\d+) + srcport + + + + fortigate-firewall-v5 + \.*dstip="(\S+)"|\.*dstip=(\S+),|\.*dstip=(\S+) + dstip + + + + fortigate-firewall-v5 + \.*dstport="(\d+)"|\.*dstport=(\d+),|\.*dstport=(\d+) + dstport + + + + fortigate-firewall-v5 + \.*appcat="(\.+)"|\.*appcat=(\.+),|\.*appcat=(\.+) + protocol + + + + fortigate-firewall-v5 + \.*apprisk="(\S+)"|\.*apprisk=(\S+),|\.*apprisk=(\S+) + status + + + + + fortigate-firewall-v5 + type=utm subtype=virus|type=utm,subtype=virus|type="utm" subtype="virus" + \.*eventtype="(\S+)"|\.*eventtype=(\S+),|\.*eventtype=(\S+) + protocol + + + + fortigate-firewall-v5 + \.*level="(\S+)"|\.*level=(\S+),|\.*level=(\S+) + status + + + + fortigate-firewall-v5 + \.*action="(\S+)"|\.*action=(\S+),|\.*action=(\S+) + action + + + + fortigate-firewall-v5 + \.*user="(\.*)"|\.*user=(\.*),|\.*user=(\.*) + srcuser + + + + fortigate-firewall-v5 + \.*srcip="(\S+)"|\.*srcip=(\S+),|\.*srcip=(\S+) + srcip + + + + fortigate-firewall-v5 + \.*dstip="(\S+)"|\.*dstip=(\S+),|\.*dstip=(\S+) + dstip + + + + fortigate-firewall-v5 + \.*srcport="(\d+)"|\.*srcport=(\d+),|\.*srcport=(\d+) + srcport + + + + fortigate-firewall-v5 + \.*dstport="(\d+)"|\.*dstport=(\d+),|\.*dstport=(\d+) + dstport + + + + fortigate-firewall-v5 + \.*filename="(\.+)"|\.*filename=(\.+),|\.*filename=(\.+) + fortigate.file_infected + + + + fortigate-firewall-v5 + \.*virus="(\.+)"|\.*virus=(\.+),|\.*virus=(\.+) + fortigate.virus_found + + + + fortigate-firewall-v5 + \.*url="(\.+)"|\.*url=(\.+),|\.*url=(\.+) + url diff --git a/rules/0390-fortigate_rules.xml b/rules/0390-fortigate_rules.xml index 05ed9f1f1..d363415fd 100644 --- a/rules/0390-fortigate_rules.xml +++ b/rules/0390-fortigate_rules.xml @@ -37,14 +37,14 @@ ID: 81600 - 80799 81603 dpd_failure Fortigate: IP Sec DPD Failed. - firewall_drop,pci_dss_1.4,gdpr_IV_35.7.d, + firewall_drop,pci_dss_1.4, 81604 Fortigate: Multiple Firewall drop events from same source. - multiple_drops,pci_dss_1.4,pci_dss_10.6.1,gdpr_IV_35.7.d, + multiple_drops,pci_dss_1.4,pci_dss_10.6.1, @@ -56,7 +56,7 @@ ID: 81600 - 80799 login failed Fortigate: Login failed. - authentication_failed,invalid_login,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_35.7.d,gdpr_IV_32.2, + authentication_failed,invalid_login,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1, @@ -64,7 +64,7 @@ ID: 81600 - 80799 alert_by_email Fortigate: Multiple failed login events from same source. - authentication_failures,pci_dss_10.6.1,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_35.7.d,gdpr_IV_32.2, + authentication_failures,pci_dss_10.6.1,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1, @@ -76,14 +76,12 @@ ID: 81600 - 80799 Configuration is changed in the admin session alert_by_email Fortigate: Configuration changed. - gdpr_IV_35.7.d,gdpr_IV_32.2, 81608 Fortigate: Multiple changed configuration events from same source. - gdpr_IV_35.7.d, + + 81603 + Add + Fortigate: Firewall configuration changes + pci_dss_1.4,gpg13_4.13, + + + + 81631 + + Fortigate: Multiple Firewall edit events from same source. + pci_dss_1.4,ci_dss_10.6.1,gpg13_4.13,gdpr_2.3, @@ -129,7 +144,7 @@ ID: 81600 - 80799 81603 ssl-login-fail Fortigate: SSL VPN User failed login attempt - authentication_failed,invalid_login,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_35.7.d,gdpr_IV_32.2, + authentication_failed,invalid_login,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1, @@ -137,7 +152,7 @@ ID: 81600 - 80799 alert_by_email Fortigate: Multiple Firewall SSL VPN failed login events from same source. - authentication_failures,pci_dss_10.6.1,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_35.7.d,gdpr_IV_32.2, + authentication_failures,pci_dss_10.6.1,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1, - + 81603 - type=traffic - high + type=traffic|type="traffic" Fortigate: Traffic to be aware of. - pci_dss_10.6.1,gdpr_IV_35.7.d, + pci_dss_10.6.1, @@ -174,25 +188,25 @@ ID: 81600 - 80799 alert_by_email Fortigate: Multiple high traffic events from same source. - pci_dss_10.6.1,gdpr_IV_35.7.d, + pci_dss_10.6.1, - + 81603 warning blocked Fortigate: URL Blocked by Firewall. - firewall_drop,pci_dss_10.6.1,gdpr_IV_35.7.d, + firewall_drop,pci_dss_10.6.1, 81620 Fortigate: Multiple URL blocked from same source. - multiple_drops,pci_dss_10.6.1,gdpr_IV_35.7.d, + multiple_drops,pci_dss_10.6.1, 81603 - level=information + level=information|level="information" tunnel-up Fortigate: VPN User connected. - authentication_success,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_32.2, + 4.13authentication_success,pci_dss_10.2.5,gpg13_7.1, 81622 Fortigate: Multiple vpn user connected from same source. - authentication_success,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_32.2, + authentication_success,pci_dss_10.2.5,gpg13_7.1, 81603 - level=information + level=information|level="information" tunnel-down Fortigate: VPN User disconnected. - pci_dss_10.2.5,gpg13_7.1,gdpr_IV_32.2, + pci_dss_10.2.5,gpg13_7.1, 81624 Fortigate: Multiple user disconnected events from same source. - pci_dss_10.2.5,gpg13_7.1,gdpr_IV_32.2, + pci_dss_10.2.5,gpg13_7.1, + + 81603 + subtype="app-ctrl"|subtype=app-ctrl + pass + Fortigate: App passed by firewall. + pci_dss_10.6.1,gdpr_2.3, + + + + 81603 + subtype="app-ctrl"|subtype=app-ctrl + block + Fortigate: App blocked by firewall. + firewall_drop,pci_dss_10.6.1,gdpr_2.3, + + 81620 + + Fortigate: Multiple URL blocked from same source. + multiple_drops,pci_dss_10.6.1,gdpr_2.3, + + + + + + 81603 + type="event" subtype="vpn" level="notice"|type=event subtype=vpn level=notice|type=event,subtype=vpn,level=notice + Fortigate: VPN related information + + + + 81603 + type="event" subtype="vpn" level="error"|type=event subtype=vpn level=error|type=event,subtype=vpn,level=error + Fortigate: VPN related error + + + + + + 81603 + subtype=virus|subtype="virus" + Fortigate: Virus detected. + pci_dss_10.6.1,gdpr_IV_35.7.d, + + + + 81638 + blocked + Fortigate: Blocked URL because a virus was detected. + firewall_drop,pci_dss_10.6.1,gdpr_IV_35.7.d, + + + + From 9b0d3c18bb3d38f010083d9e7f381a9827963570 Mon Sep 17 00:00:00 2001 From: frgv <36547287+frgv@users.noreply.github.com> Date: Mon, 25 Jun 2018 16:41:06 +0200 Subject: [PATCH 3/9] Added passthrough rule (Fortigate) --- rules/0390-fortigate_rules.xml | 14 ++++++++++++++ 1 file changed, 14 insertions(+) diff --git a/rules/0390-fortigate_rules.xml b/rules/0390-fortigate_rules.xml index d363415fd..07c75af54 100644 --- a/rules/0390-fortigate_rules.xml +++ b/rules/0390-fortigate_rules.xml @@ -354,6 +354,20 @@ May 31 08:58:56 172.0.0.1 date=2018-05-31 time=08:58:56 devname="BA-BEBI" devid= firewall_drop,pci_dss_10.6.1,gdpr_IV_35.7.d, + + + + 81603 + notice + passthrough + Fortigate: URL belongs to an allowed category. + pci_dss_10.6.1, + + From e8f9c9cc895c528922304b34329ac3d74219f1a9 Mon Sep 17 00:00:00 2001 From: AlfonsoRBJ Date: Mon, 25 Jun 2018 18:30:13 +0200 Subject: [PATCH 4/9] GDPR groups added GDPR groups added to the new rules. --- rules/0390-fortigate_rules.xml | 61 +++++++++++++++++----------------- 1 file changed, 31 insertions(+), 30 deletions(-) diff --git a/rules/0390-fortigate_rules.xml b/rules/0390-fortigate_rules.xml index 07c75af54..3d776c822 100644 --- a/rules/0390-fortigate_rules.xml +++ b/rules/0390-fortigate_rules.xml @@ -37,14 +37,14 @@ ID: 81600 - 80799 81603 dpd_failure Fortigate: IP Sec DPD Failed. - firewall_drop,pci_dss_1.4, + firewall_drop,pci_dss_1.4,gdpr_IV_35.7.d, 81604 Fortigate: Multiple Firewall drop events from same source. - multiple_drops,pci_dss_1.4,pci_dss_10.6.1, + multiple_drops,pci_dss_1.4,pci_dss_10.6.1,gdpr_IV_35.7.d, @@ -56,7 +56,7 @@ ID: 81600 - 80799 login failed Fortigate: Login failed. - authentication_failed,invalid_login,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1, + authentication_failed,invalid_login,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_35.7.d,gdpr_IV_32.2, @@ -64,7 +64,7 @@ ID: 81600 - 80799 alert_by_email Fortigate: Multiple failed login events from same source. - authentication_failures,pci_dss_10.6.1,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1, + authentication_failures,pci_dss_10.6.1,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_35.7.d,gdpr_IV_32.2, @@ -76,12 +76,14 @@ ID: 81600 - 80799 Configuration is changed in the admin session alert_by_email Fortigate: Configuration changed. + gdpr_IV_35.7.d,gdpr_IV_32.2, 81608 Fortigate: Multiple changed configuration events from same source. + gdpr_IV_35.7.d, @@ -60,7 +57,6 @@ Feb 20 12:31:11 date=2011-02-20 time=12: 31:09 devname=Name_of_Device device_id= @@ -112,7 +108,6 @@ date=2016-06-15 time=09:41:35 devname=Device_Name devid=FGTXXXX9999999999 logid= @@ -157,8 +152,6 @@ Mar 22 19:21:00 10.10.10.10 date=2016-03-22 time=19:20:46 devname=Text devid=FGT @@ -266,15 +259,10 @@ date=2016-06-15 time=11:44:46 devname=Device_Name devid=FGTXXXX9999999999 logid= @@ -338,7 +326,6 @@ date=2016-06-16 time=16:22:34 devname=Mobipay_Firewall devid=FGTXXXX9999999999 l @@ -375,13 +362,9 @@ date=2016-06-17 time=02:37:41 devname=Mobipay_Firewall devid=FGTXXXX9999999999 l fortigate-firewall-v5 type=traffic|type="traffic" - \.*srcip="(\S+)"|\.*srcip=(\S+),|\.*srcip=(\S+) + \.*level="(\S+)"|\.*level=(\S+),|\.*level=(\S+) + level + + + + fortigate-firewall-v5 + \.*srcip="(\S+)"|\.*srcip=(\S+),|\.*srcip=(\S+) srcip @@ -460,6 +448,12 @@ date=2016-06-16 time=10:49:08 devname=Device_Name devid=FGTXXXX9999999999 logid= dstport + + fortigate-firewall-v5 + \.*action="(\S+)"|\.*action=(\S+),|\.*action=(\S+) + action + + fortigate-firewall-v5 \.*appcat="(\.+)"|\.*appcat=(\.+),|\.*appcat=(\.+) @@ -541,3 +535,4 @@ date=2018-05-31 time=08:58:56 devname="BA-RSYS-FW" devid="FG600C3912803212" logi \.*url="(\.+)"|\.*url=(\.+),|\.*url=(\.+) url + From 1c55c30f2d8a08be92d3be957592d7f231021885 Mon Sep 17 00:00:00 2001 From: lopezziur Date: Tue, 30 Jul 2019 11:24:23 +0200 Subject: [PATCH 7/9] corrected typos --- rules/0390-fortigate_rules.xml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/rules/0390-fortigate_rules.xml b/rules/0390-fortigate_rules.xml index 8e6ab7009..78d45943f 100644 --- a/rules/0390-fortigate_rules.xml +++ b/rules/0390-fortigate_rules.xml @@ -135,7 +135,7 @@ ID: 81600 - 80799 81631 Fortigate: Multiple Firewall edit events from same source. - pci_dss_1.4,ci_dss_10.6.1,gpg13_4.13,gdpr_IV_35.7.d, + pci_dss_1.4,pci_dss_10.6.1,gpg13_4.13,gdpr_IV_35.7.d, @@ -219,7 +219,7 @@ ID: 81600 - 80799 level=information|level="information" tunnel-up Fortigate: VPN User connected. - 4.13authentication_success,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_32.2, + authentication_success,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_32.2, From 42bd67a938bfd9ca65bd48165e47f3aa749ab457 Mon Sep 17 00:00:00 2001 From: lopezziur Date: Tue, 30 Jul 2019 13:23:46 +0200 Subject: [PATCH 8/9] adds HIPAA and NIST standards to the label groups --- rules/0390-fortigate_rules.xml | 64 +++++++++++++++++----------------- 1 file changed, 32 insertions(+), 32 deletions(-) diff --git a/rules/0390-fortigate_rules.xml b/rules/0390-fortigate_rules.xml index 7844a2f84..3c35f8a1e 100644 --- a/rules/0390-fortigate_rules.xml +++ b/rules/0390-fortigate_rules.xml @@ -38,14 +38,14 @@ ID: 81600 - 80799 81603 dpd_failure Fortigate: IP Sec DPD Failed. - firewall_drop,pci_dss_1.4,gdpr_IV_35.7.d,hipaa_164.312.a.1,nist_800_53_SC.7, + firewall_drop,pci_dss_1.4,gdpr_IV_35.7.d,nist_800_53_SC.7,hipaa_164.312.a.1, 81604 Fortigate: Multiple Firewall drop events from same source. - multiple_drops,pci_dss_1.4,pci_dss_10.6.1,gdpr_IV_35.7.d,hipaa_164.312.a.1,hipaa_164.312.b,nist_800_53_SC.7,nist_800_53_AU.6, + multiple_drops,pci_dss_1.4,pci_dss_10.6.1,gdpr_IV_35.7.d,nist_800_53_SC.7,nist_800_53_AU.6,hipaa_164.312.a.1,hipaa_164.312.b, @@ -57,7 +57,7 @@ ID: 81600 - 80799 login failed Fortigate: Login failed. - authentication_failed,invalid_login,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_35.7.d,gdpr_IV_32.2,hipaa_164.312.b,nist_800_53_AU.14,nist_800_53_AC.7, + authentication_failed,invalid_login,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_35.7.d,gdpr_IV_32.2,nist_800_53_AU.14,nist_800_53_AC.7,hipaa_164.312.b, @@ -65,7 +65,7 @@ ID: 81600 - 80799 alert_by_email Fortigate: Multiple failed login events from same source. - authentication_failures,pci_dss_10.6.1,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_35.7.d,gdpr_IV_32.2,hipaa_164.312.b,nist_800_53_AU.6,nist_800_53_AU.14,nist_800_53_AC.7, + authentication_failures,pci_dss_10.6.1,pci_dss_10.2.4,pci_dss_10.2.5,gpg13_7.1,gdpr_IV_35.7.d,gdpr_IV_32.2,nist_800_53_AU.6,nist_800_53_AU.14,nist_800_53_AC.7,hipaa_164.312.b, @@ -94,7 +94,7 @@ ID: 81600 - 80799 81603 http_decoder: HTTP.Unknown.Tunnelling Fortigate: Default tunneling setting. Could be IPS. - pci_dss_10.6.1,gdpr_IV_35.7.d,hipaa_164.312.b,nist_800_53_AU.6, + pci_dss_10.6.1,gdpr_IV_35.7.d,nist_800_53_AU.6,hipaa_164.312.b, @@ -102,7 +102,7 @@ ID: 81600 - 80799 alert_by_email Fortigate: Multiple default tunneling setting events from same source. - pci_dss_10.6.1,gdpr_IV_35.7.d,hipaa_164.312.b,nist_800_53_AU.6, + pci_dss_10.6.1,gdpr_IV_35.7.d,nist_800_53_AU.6,hipaa_164.312.b,