The Importance of “Logging Options” on a Firewall policy

In today’s digital landscape, network security is more crucial than ever. At our organization, we have implemented a robust central management and security system using FortiAnalyzer and FortiManager. Over the past few months, this setup has been instrumental in detecting anomalies, including serious threats such as trojans, worms, and command-and-control (C&C) attempts. After reviewing our configurations and researching industry best practices, I’ve identified some fundamental strategies that have proven effective in detecting these anomalies. I’m excited to share these insights to help others secure their networks with a basic yet effective setup.

Key Configurations for Effective Telemetry

To ensure comprehensive telemetry, we configured the following:

  1. Enabled Security Profiles
  2. Enabled Full Logging on Firewall Policies
  3. Forwarded Logs to FortiAnalyzer

Security Profiles

Recommendation: If you’re uncertain about how to configure security profiles, start with the default policies. Most default settings are in read-only or monitor mode. Enabling these settings flags traffic for inspection and logs it. Once this data is sent to FortiAnalyzer, you can review and analyze it for potential threats.

Log Analytics with FortiAnalyzer

FortiAnalyzer is equipped with advanced analytic techniques that should be leveraged for optimal security. If you don’t have an on-premise solution, consider a cloud-based option. Regardless of your choice, integrating FortiAnalyzer is highly recommended for its powerful analytics capabilities.

Conclusion

A well-configured FortiAnalyzer and FortiManager setup can significantly enhance your network’s security posture. By enabling security profiles, comprehensive logging, and utilizing FortiAnalyzer’s analytical tools, you can detect and mitigate threats effectively. Remember, a basic but correctly implemented setup can make a world of difference in protecting your network.

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.