Security-Driven Analytics and Log Management; FortiAnalyzer provides deep insights into advanced threats through Single-Pane Orchestration, Automation, and Response for your entire attack surface to reduce risks and improve your organization’s overall security
Integrated with Fortinet’s Security Fabric, FortiAnalyzer simplifies the complexity of analyzing and monitoring new and emerging technologies that have expanded the attack surface, and delivers end-to-end visibility, helping you identify and eliminate threats. Advanced Threat Detection and Correlation allows security and network teams to immediately identify and respond to network security threats across the infrastructure.
Automated Workflows and Compliance Reporting provides customizable dashboards, reports, and advanced workflow handlers for both security and network teams to accelerate workflows and assist with regulation and compliance audits.
Scalable Log Management collects logs from FortiGate, FortiClient, FortiManager, FortiSandbox, FortiMail, FortiWeb, FortiAuthenticator, Generic syslog, and others. Deploy as an individual unit or optimize for a specific operation, and scale storage based on retention requirements.
Security Fabric Analytics
- Event correlation across all logs and real-time anomaly detection, with Indicator of Compromise (IOC) service and threat detection, reducing time-to-detect Fortinet Security Fabric integration
- Correlates with logs from FortiClient, FortiSandbox, FortiWeb, and FortiMail for deeper visibility and critical network insights Enterprise-grade High Availability
- Automatically back-up FortiAnalyzer databases (up to four node cluster) that can be geographically dispersed for disaster recovery Security Automation
- Reduce complexity and leverage automation via REST API, scripts, connectors, and automation stitches to expedite security response Multi-Tenancy and Administrative Domains (ADOMs)
- Separate customer data and manage domains leveraging ADOMs to be compliant and operationally effective Flexible Deployment Options and Archival Storage
- Supports deployment of appliance, VM, hosted, or cloud. Use AWS, Azure, or Google to archive logs as a secondary storage
Security Operations Center
FortiAnalyzer’s Security Operations Center (SOC) helps security teams protect networks with real-time log and threat data in the form of actionable views, notifications, and reports. Analysts can protect network, web sites, applications, databases, data centers, and other technologies through centralized monitoring, awareness of threats, events, and network activity. The predefined and custom dashboards provide a single-pane-of-glass for easy integration into your Security Fabric. The new FortiSOC service subscription provides built-in incident management workflows with playbooks and connectors to simplify the security analysts’ role with enhanced security automation and orchestration.
Incident Detection and Response
FortiAnalyzer’s automated incident response capability enables security teams to manage incident life cycle from a single view. Analysts can focus on event management and identification of compromised endpoints through default and customized event handlers with quick detection, automated correlation, and connected remediation of Fortinet devices and syslog servers with incident management and playbooks for quick assignment of incidents for analysis. Track timelines and artifacts with audit history and incident reports, as well as streamline integration with ITSM platforms that help bridge gaps in your Security Operations Center and reinforces your security posture.
FortiAnalyzer Playbooks boost security team abilities to simplify efforts and focus on critical tasks. Out-of-the-box playbook templates enable SOC analysts to quickly customize and automate their investigation use cases to respond to compromised hosts, critical intrusions, blocking C&C IPs, and more. Flexible playbook editor for hosts under investigation. FortiAnalyzer also allows analysts to drill down to a playbook and review task execution details and edit playbooks to define custom processes and tasks. FortiAnalyzer License includes built-in connectors for playbooks to interact with other Security Fabric devices like FortiOS and EMS.
Indicators of Compromise
The Indicators of Compromise (IOC) service identifies suspicious usage and artifacts observed on a network or in an operations system that are determined with high confidence to be a computer intrusion. FortiGuard’s IOC subscription provides intelligence information to help security analysts identify risky devices and users based on these artifacts. The IOC package consists of around 500K IOCs daily and delivers it via our Fortinet Developers Network (FNDN) to our FortiSIEM, FortiAnalyzer, and FortiCloud products. Analysts can also re-scan historical logs for threat hunting and identify threats based on new intelligence, as well as review users’ aggregated threat scores by IP addresses, hostname, group, OS, overall threat rating, a location Map View, and a number of threats.
Asset and Identity
Security Fabric assets and identity monitoring and vulnerability tracking provides full SOC visibility and analytics of the attack surface. Assets and identity visibility and assets classification based on telemetry from NAC. Built-in SIEM module for automated log collection, normalization, and correlation. Integrated with FortiSOAR for further incident investigation and threat eradication. Support export of incident data to FortiSOAR through the FortiAnalyzer Connector and API Admin.
FortiAnalyzer provides 39+ built-in templates that are ready to use with sample reports to help identify the right report for you. You can generate custom data reports from logs by using the Reports feature. Run reports on-demand or on a schedule with automated email notifications, uploads, and an easy to manage calendar view. Create custom reports with the 700+ built-in charts and datasets that are ready with flexible formats including PDF, HTML, CSV, and XML
SD-WAN dashboards enable customers to instantly see the benefit of applying SD-WAN across multiple WAN interfaces with event handlers to detect SD-WAN alerts for real-time notification and action. History graphs for WAN link health monitoring: Jitter, Latency, Packet Loss, Critical- and High- severity SD-WAN alerts. New Secure SD-WAN report provides an executive summary of important SD-WAN metrics, detailed charts and history graphs for SD-WAN link utilization by applications, latency, Packet Loss, Jitter changes, and SD-WAN performance statistics.
Log Forwarding for Third-Party Integration
You can forward logs from a FortiAnalyzer unit to another FortiAnalyzer unit, a syslog server, or (CEF) server. The client FortiAnalyzer forwards logs to the server FortiAnalyzer unit, syslog server, or CEF server. In addition to forwarding logs to another unit or server, the client retains a local copy of the logs that are subject to the data policy settings for archived logs. Logs are forwarded in real-time or near real-time as they are received.
Multi-Tenancy with Flexible Quota Management
Time-based archive / analytic log data policy per Administrative Domain (ADOM), automated quota management based on the defined policy, and trending graphs to guide policy configuration and usage monitoring.
The new FortiAnalyzer subscription license model consolidates the VM product SKU and the FortiCare Support SKU, as well as IOC and FortiAnalyzer SOC (SOAR/SIEM) services into one single SKU to simplify the product purchase, upgrade, and renewal. The FortiAnalyzer S-Series SKUs come in stackable 5, 50, and 500 GB/day logs licenses so that multiple units of this SKU can be purchased at a time to increase the number of GB/day logs. This SKU can also be purchased together with other FAZ VM-S SKUs to expand the total number of GB/day logs.
FortiAnalyzer-VM integrates network logging, analyses, and reporting into a single system, delivering increased knowledge of security events throughout a network. Using virtualization technology, FortiAnalyzer-VM is a software-based version of the FortiAnalyzer hardware appliance and is designed to run on many virtualization platforms. It offers all the features of the FortiAnalyzer hardware appliance. FortiAnalyzer-VM provides organizations with centralized security event analyses, forensic research, reporting, content archiving, data mining, malicious file quarantining, and vulnerability assessment. Centralized collection, correlation, and analyses of geographically and chronologically diverse security data from Fortinet and third party devices deliver a simplified, consolidated view of your security posture.
Fortinet also offers cloud-based analytics and reporting service to enable customers who want to leverage Fortinet managed FortiAnalyzer infrastructure. Customers and partners can easily access their FortiAnalyzer Cloud from their FortiCloud Single-Sign-On Portal.