Forti-EDR Device Configuration

Modified on Tue, 21 Apr at 3:10 PM


TABLE OF CONTENTS


Overview

FortiEDR provides multi-layered endpoint detection and response with both pre-infection and post-infection protection. It focuses not only on blocking advanced malware in real time but also on preventing data exfiltration and ransomware attacks after infiltration occurs.

A key feature is FortiEDR’s virtual patching, which blocks malicious outbound communications while allowing legitimate activities to continue, ensuring minimal business disruption even on compromised endpoints.

For integration with ADR (or other SIEM platforms), FortiEDR can be configured to export events via Syslog. This enables centralized monitoring, correlation, and alerting of endpoint activity.


Prerequisites

Before configuring FortiEDR with ADR:

  • FortiEDR Central Manager access with administrator privileges.

  • Syslog server details (IP address, protocol, port).

  • Ensure UDP/TCP port 514 is open between FortiEDR and the ADR CCE (Collector).

  • Root/admin access to the CCE for verification.


Configuration Steps

Step 1: Access Export Settings

  1. Log in to the FortiEDR Central Manager Console.

  2. Navigate to:
    Administration > Export Settings.

Step 2: Define Syslog Destination

  1. Click the “+” icon to define a new Syslog destination.

  2. Enter the following details:

    • Syslog Server IP → ADR CCE IP address.

    • Protocol → Select UDP (default, port 514) or TCP/TLS if required.

    • Format → CEF (recommended for SIEM parsing).

Step 3: Enable Notifications

  1. Select the newly created syslog destination row.

  2. In the Notifications pane, use the sliders to enable event forwarding.

  3. Select the event categories you want forwarded (recommended: all security events).

Step 4: Select Fields to Export

  1. Click the “⋆” (star) button.

  2. Check the boxes for fields to be included in the Syslog messages, such as:

    • Event ID

    • Raw Data ID

    • Source/Destination IP

    • Threat Type / Severity

    • Action Taken


Verification (MSSP Only)

From ADR UI

  1. Log in to the ADR portal.

  2. Navigate to:
    System > Logs and Flows Collection Status.

  3. Confirm the FortiEDR Source Device IP is visible.

From CCE Server

Run the following command on the CCE to confirm logs are received:

sudo tcpdump -i any port 514 and host <FortiEDR_IP>
  • If logs are received, you will see Syslog messages streaming in.

  • If not, check firewall rules and syslog configuration in FortiEDR.

Reference -

https://docs.fortinet.com/document/fortiedr/6.2.0/administration-guide/109591/syslog


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article