Lab Guide - FortiClientEMS+FortiEDR
Lab Guide - FortiClientEMS+FortiEDR
0
Use Case: Proactive Advanced Endpoint Protection, Visibility and Control for Critical Assets including ZTNA
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
In this Fast Track, we will explore controlling endpoints using Fortinet Advanced Endpoint
Protection tools in mixed Windows & Linux environments and see first-hand how these
solutions integrate with the Fortinet Security Fabric to protect your company’s critical assets.
Note: For all objectives, click Continue then select the next available objective from the list to
proceed.
Index: 1.0 (a)
Use Case: Proactive Advanced Endpoint Protection, Visibility and Control for Critical Assets
including ZTNA
Objective Title: Fast Track Program
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Fast Tracks are a free instructor-led hands-on workshop that introduce Fortinet solutions for
securing your digital infrastructure. These workshops are only an introduction to what Fortinet
security solutions can do for your organization. For more in-depth training, we encourage you
to investigate our full portfolio of NSE training courses at https://training.fortinet.com
Index: 1.0 (b)
Use Case: Proactive Advanced Endpoint Protection, Visibility and Control for Critical Assets including ZTNA
Objective Title: Topology
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Welcome
to the
Advanced Endpoint Workshop
Network Topology
Index: 1.0 (c)
Use Case: Proactive Advanced Endpoint Protection, Visibility and Control for Critical Assets including ZTNA
Objective Title: Agenda
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
FortiClient ZTNA
Topic Time Prerequisite
Lab 2.0: FortiClient EMS & Fortinet Security Fabric 15 Minutes Lab 1
Lab 2.1: Customizing the FortiClient Installer 15 Minutes Lab 2
Lab 2.2: Zero Trust Network Access 30 Minutes Lab 2
FortiClient ZTNA
Endpoint Protection provides security measures that prevent threat, mitigate risks, reduce
exposure, and ensure endpoint compliance. An additional key function of FortiClient EMS is to
strengthen the Security Fabric by providing information about the endpoints to the FortiGates.
The FortiClient EMS can pull machine and user information from Active Directory, which can
then be used by the FortiGate policies.
In the following objectives of this use case, you will establish the communication between EMS,
Active Directory, and Security Fabric and demonstrate ZTNA capabilities.
Time to Complete
Estimated: 60 minutes
Add Domain
1. From the Lab Activity: Endpoint tab, access FortiClient EMS using the HTTPS option.
Note: Unless otherwise indicated, all username and passwords for various admin consoles
are:
Username: admin Password: Fortinet1!
2. Navigate to Endpoints > Domains > Add a domain.
3. Use the following information:
IP address/Hostname: 172.16.100.10
Port: 389
Bind type: Regular
Username: admin
Password: Fortinet1!
Note: The common practice is to observe the distinguished name (DN) of a domain
when there is more than one forest in the network. In the above, it was possible to
obtain the value automatically as there is only one domain but in case of manual
entry is required, the DN is acmecorp.net
alice
bob
carol
david
Note: EMS provides granular control in assigning endpoint policies to specific AD
users/user groups.
7. For On-Fabric Detection Rules, Select Corporate Network from the drop-down menu.
8. Click Save.
Hint: 1 Points: 2
Hint Text:
Hint 1:
FortiGate was the only device to manage FortiClient until EMS became available.
Answer: radio
Answer Text:
Answer
False
FortiGate provides the required telemetry service to extend visibility and control vulnerability
and quarantine compromised endpoint.
Answer Key:
✘ 1. True
✔ 2. False
Index: 2.0 (b)
Use Case: FortiClient ZTNA
Objective Title: Integrating EMS with Security Fabric
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Status: Enabled
Name: FortiClient-EMS
IP/Domain: 172.16.100.125
7. Click OK
8. Click Close
9. Click Security Fabric > Fabric Connectors.
Note: FortiClient-EMS connector was automatically created based on the information you
just provided in the Settings section. Notice that this connector has a red arrow pointing
downward, which means that it is not communicating properly to its destination.
4. Similarly, Select FortiGate-ISFW with serial no, FGVM01TM19002141 and click Authorize
Note: Both FortiGates should show up as authorized.
Index: 2.3
Use Case: Customizing the FortiClient Installer
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
To facilitate the installation of FortiClient on the endpoints, EMS allows the creation of custom
FortiClient deployment packages with pre-configured parameters needed for an endpoint to
register with EMS and connect to FortiGate as part of the Security Fabric group. These
installation packages however, are only for Windows and Mac OS operating systems.
You can install FortiClient (Linux) on Ubuntu, CentOS, and RedHat operating systems. In the
interest of time the FortiClient(Linux) has already been installed for you on the Ubuntu
workstation.
In this exercise, you will create an installation package and install FortiClient on the Windows
workstation.
Objectives
Create a deployment package.
Time to Complete
Estimated: 15 minutes
Index: 2.3 (a)
Use Case: Customizing the FortiClient Installer
Objective Title: Creating Deployment Package
Points: 10
----------------------- Objective Section -----------------------
Objective Text:
1. From the web browser, access the FortiClient EMS using the web console.
2. Click Deployment & Installers > FortiClient Installer.
3. Click + Add.
4. Under Version section, select Installer Type as Choose an official release.
5. For Release, select 7.0 from the drop down list.
6. For Patch, choose 7.0.7
7. Click Next.
8. Under General section, type the Name as FCT-Installer
Note: Make sure the name is typed in the exact same manner as shown below in the
screenshot.
9. Click Next.
10. Under Features section, leave everything set to default settings.
11. Click Next.
12. Under Advanced, checkmark the following settings:
Hint: 1 Points: 4
Hint Text:
Hint 1:
You can configure a FortiClient installer with an installer ID, then deploy this installer to the
desired endpoints. When the endpoints' FortiClient connects to FortiClient EMS, FortiClient
EMS places them in the desired group. For example, consider you want all endpoints located in
your company's headquarters to be placed in the same endpoint group.
Answer: radio
Answer Text:
Answer
True
Answer Key:
✔ 1. True
✘ 2. False
Index: 2.3 (b)
Use Case: Customizing the FortiClient Installer
Objective Title: Installing FortiClient
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Install FortiClient
In most companies, new machines connect to the corporate network on a regular basis. In this
exercise, we have a Windows machine that was recently joined to the domain and requires
further steps to meet the company’s compliance policy. To that end, we will install FortiClient
on this workstation via the install package we created in the previous objective.
1. From the Lab Activity: Endpoint tab, access Alice machine using the RDP option.
Username: ACMECORP/alice Password: Fortinet1!
1. Open Chrome web browser on the desktop and using the FCT-Installer bookmark, browse to
https://172.16.100.125:10443/installers/Default/FCT-Installer
2. Click advanced and proceed to website (not recommended) to get past the certificate
warning page.
3. The installer folder should be displayed. Select FortiClientSetup_7.0.7_x64.exe
4. Pay attention to the bottom left corner of the browser, to see that the file is being
downloaded.
Note: Click keep and allow the download if you see a browser pop-up warning that the file
might be harmful.
6. When you get confirmation that the file has been downloaded, the installer should be saved
in the Downloads folder. Go ahead and start the installer.
7. Once the Installer starts, go ahead and close (or minimize) the browser.
8. Follow the wizard process by ticking the checkbox Yes, I have read and accept the License
Agreement.
9. Click Next.
10. Leave the default directory specified and click Next.
11. Click Install and wait for a few moments while the installation completes.
12. When the installer wizard is done, click Finish.
13. Open the FortiClient console by double clicking the FortiClient icon on the Desktop.
Note: Wait for a 1-2 minutes to allow FortiClient to connect and fully synchronize with EMS.
Pay attention to FortiClient notification on the taskbar. In case the FortiClient isn’t
automatically connected to EMS server, Click Zero Trust Telemetry and enter IP
172.16.100.125. Click Connect.
1. From the web browser, access FortiClient EMS using the web console.
Note: Alice’s avatar may not be visible but will eventually sync up on the next sync cycle.
Index: 2.4
Use Case: Zero Trust Network Access
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Zero Trust Network Access (ZTNA) is an access control method that uses client device
identification, authentication, and Zero Trust tags to provide role-based application access. It
gives administrators the flexibility to manage network access for On-net local users and Off-net
remote users. Access to applications is granted only after device verification, authenticating the
user’s identity, authorizing the user, and then performing context based posture checks using
Zero Trust tags.
When On-net and Off-net FortiClient endpoints register to FortiClient EMS, device information,
log on user information, and security posture are all shared over ZTNA telemetry with the EMS
server. Based on the client information, EMS applies matching Zero Trust tagging rules to tag
the clients. These tags, and the client certificate information, are synchronized with the
FortiGate in real-time. This allows the FortiGate to verify the client's identity using the client
certificate, and grant access based on the ZTNA tags applied in the ZTNA rule.
Objectives
Create Zero Trust Tags and Rules
Time to Complete
Estimated: 25 minutes
Index: 2.4.1
Use Case: Dynamic Access Control (AD Group Membership)
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
A feature that was introduced in the 6.2 version of EMS, is the ability to tag endpoints based on
Active Directory user group membership of the logged in user. EMS considers the endpoint as
satisfying the rule if the logged in user belongs to the selected AD group. You can also use the
NOT option to indicate that the rule requires that the logged in user certain does not belong to
certain AD groups.
As these conditions change, EMS updates the tags on the Endpoints and passes that
information on to the FortiGates, which can then dynamically control access to the endpoints
via the firewall policies.
In this use case, you will create Zero Trust Tagging rules to apply tags to the endpoints, and
then pull those tags into the FortiGate via an EMS connector. You will then apply these ZTNA
tags to the firewall and demonstrate the changes in access as the tags on the endpoint change.
Objectives
Create Zero Trust Tagging Rules and Tags
Time to Complete
Estimated: 15 minutes
Index: 2.4.1 (a)
Use Case: Dynamic Access Control (AD Group Membership)
Objective Title: Creating Zero Trust Tags and Rules
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
EMS tags the endpoints based on Zero Trust Tagging Rules. Let’s have a look at an existing rule,
and then create a few more.
Name: Sales_User
OS: Windows
AD Group: Users/Sales
Note: Take a moment to explore the different rule types with which you can apply
tags to devices.
3. Click Save.
4. Click Save.
1. From the Lab Activity: Endpoint tab, access FGT-ISFW using the HTTPS option.
8. Click OK
Note: You are giving sales users access to marketing network.
9. Select the To HR Network firewall policy and click Edit
10. For IP/MAC Based Access Control, click + and select Trusted_PC_Tag
11. Click OK
Note: You are giving FCT registered users access to HR network.
Index: 2.4.1 (c)
Use Case: Dynamic Access Control (AD Group Membership)
Objective Title: Verifying Access Control
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
2. If you have not logged in automatically, login as the user alice and password Fortinet1!
3. Open the Putty application by double clicking on the Putty shortcut on the Desktop.
4. Select HR from the Saved Sessions area, and click on the Load button.
5. Click Open
Note: Click Yes to accept the SSH key fingerprint. The Putty window should open, and you
should see the login prompt. This tells you that the application was able to access the
destination host in the HR network and establish a connection. So Alice has access to the HR
network.
Disconnect FortiClient
1. Open the FortiClient console, and click Disconnect.
2. When asked if you are sure you want to disconnect, select Yes.
5. Open Putty from Desktop. Select Sales from the Saved Sessions area, click Load and click
Open
Note: The Putty window should open, and you should see the login prompt. This tells you
that the application was able to access the destination host in the Sales network and
establish a connection. So Alice has access to the Sales network which makes sense as Alice
is in the Sales AD group
Re-Connect FortiClient
4. Click Connect
Index: 2.4.2
Use Case: AntiVirus Compliance
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Zero Trust Network Access (ZTNA) is an access control method that uses client device
identification, authentication, and Zero Trust tags to provide role-based application access. It
gives administrators the flexibility to manage network access for On-net local users and Off-net
remote users. Access to applications is granted only after device verification, authenticating the
user’s identity, authorizing the user, and then performing context based posture checks using
Zero Trust tags.
In this use case, you will create a AV compliance check tag through a Zero Trust Tagging rule.
You will then apply ZTNA tag on firewall policy and demonstrate the changes in access as the
tags on the endpoint change.
Objectives
Configure Zero Trust tag and rule
Time to Complete
Estimated: 10 minutes
Index: 2.4.2 (a)
Use Case: AntiVirus Compliance
Objective Title: Creating AV Check Zero Trust Tags and Rules
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
3. Expand Sales Network (port2) -> EDGE_ISFW Network (port4) policy section.
Note: If you don’t see the AV_Enabled_Tag listed, wait for 1-2 minutes for EMS to sync the
new tag with the FortiGate and refresh the browser tab.
8. Click OK
Stop and think
Out of the following, what are the different Zero Trust Tagging Rule types supported by
FortiClient EMS? (Select all that apply)
Hint: 1 Points: 2
Hint Text:
Hint 1:
In the EMS console, click Compliance Verification > Compliance Verification Rules > + Add > +
Add Rule > Rule Type
Answer: checkbox
Answer Text:
Answer:
AntiVirus From the AV Software dropdown list, select the desired conditions. You
Windows
Software installed and running and that the AV signature is up-to-date. You can a
macOS endpoint does not have AV software installed or running or that the AV
FortiClient AV and third-party AV software that registers to the Window
Linux Windows Security Center of the status of its signatures. FortiClient que
third party AV software is installed and if the software reports signature
The endpoint must satisfy all configured conditions to satisfy this rule.
Only FortiClient 6.2.2+ endpoints support this rule type.
Certificate In the Subject CN and Issuer CN fields, enter the certificate subject and
Windows
that the rule requires that a certain certificate is not present for the endp
macOS The endpoint must satisfy all conditions to satisfy this rule. For example
certificate B, and NOT certificate C, then the endpoint must have both c
Linux
OS Version Windows From the OS Version field, select the OS version. If the rule is configure
as satisfying the rule if it has one of the configured OS versions installe
macOS
Linux
iOS
Android
Registry In the Registry Key field, enter the registry key or registry data value. E
Windows
Key to indicate a registry data value. You can also use the NOT option to in
data value is not present on the endpoint.
The endpoint must satisfy all configured conditions to satisfy this rule. F
key A, registry key B, and NOT registry key C, then the endpoint must h
Windows From the Windows Security dropdown list, select the desired conditions
Windows
Security Defender, Bitlocker Disk Encryption, Exploit Guard, Application Guard,
NOT option for the rule to require that the endpoint have Windows Defe
Application Guard, and/or Windows firewall disabled.
The endpoint must satisfy all configured conditions to satisfy this rule.
Only FortiClient 6.2.2+ endpoints support this rule type.
Answer Key:
✔ 1. Certificate
✔ 2. AntiVirus Software
✔ 3. OS Version
✔ 4. Windows Security
✔ 5. Registry Key
Index: 2.4.2 (c)
Use Case: AntiVirus Compliance
Objective Title: Verifying Access to Corporate Assets
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Let’s verify what level of network access does Alice’s Windows machine has in the network and
how does the AV_Enabled Zero Trust tag modifies it.
5. Click Save
6. Click Zero Trust Tags > Zero Trust Tag Monitor
Note: Alice’s machine should be tagged with AV_Enabled Tag. If you don’t see the correct
tag information, wait for 1-2 minutes as Alice machine’s FortiClient configuration is sync’d
with the EMS server.
Disconnect FortiClient
1. From the web browser tab, RDP to Alice machine using the web console.
2. Open FortiClient console from Desktop.
3. Click Zero Trust Telemetry
4. Click Disconnect
5. From the System tray right-bottom corner, click ^ Show Hidden icons
6. Right-click FortiClient icon and click Shutdown FortiClient
NOTE: This is done just to make sure there are no issues with the next lab objectives.
Index: 3.0
Use Case: FortiEDR Endpoint Security
Objective Title: FortiEDR Endpoint Security
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
The security team at ACME Corp must enhance its existing endpoint security solution to
prevent malware prevention and data loss.
Using FortiEDR, the SOC team will find and remediate possible threats on these new users’
laptops, particularly those working in more secure areas such as accounting and finance,
without impacting critical business services.
This enhanced endpoint protection use case will include the following exercises:
Event and forensics analysis on malware, PUPs (possibly unwanted programs), and
suspicious programs
Introduction
Objectives
Overview of backend EDR infrastructure
Time to Complete
Estimated: 10 minutes
Index: 3.1 (a)
Use Case: Architecture and Deployment
Objective Title: Architecture and Overview
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Background
This objective introduces the FortiEDR solution components required to stop malicious threats.
This exercise provides additional context for future objectives.
The FortiEDR solution has several components, all of which work together to protect endpoints
at scale.
FortiEDR Aggregator – manages the collection from the collectors to the FortiEDR
Central Manager
FortiEDR Central Manager – a central web server and backend server for viewing
and analyzing events
FortiEDR Threat Hunter Repository – allows admins to find and delete malware
across any of the devices.
Tasks
1. From the Lab Activity: Endpoint tab, access FortiEDR using the HTTPS option.
2. Click Dashboard. Locate System Components widget and note the system components of
the system.
If the EDR-Core is down/red, go to Lab Activity Tab, click FortiEDR-Core. Click Power off.
Wait for 1-2 minutes. Click Power on to turn on the VM. Wait for a few minutes for the core
to come back up and check the FortiEDR dashboard again.
Tasks
3. Go through the install wizard setting. Use the default settings and click Next
Port: 8081
5. Click Yes
6. Click Close
Note: Green bar in the upper right side, indicating that the collector is properly running on
the Windows 2016 (Alice) victim machine. In case, the collector is not showing in
green/running state, wait 2-3 minutes for configuration to sync between EDR collector and
FortiEDR Agg/Manager.
3. Click Inventory > Collectors to show all collectors
Note: To avoid changing menus, one could click on the green dashboard “running” bar
instead.
Note: In case, the EDR collector is not showing in green/running state, wait 2-3
minutes for configuration to sync between collector and FortiEDR Agg/Manager.
5. Click Security Settings > Security Events > Security Policies.
Note: All policies by default are in simulation mode (which alerts on malicious activities).
Keep these settings for the next malware analysis exercise.
Note: Policies are always in either simulation or prevention mode. However, the rules under
each policy can be disabled on a case by case basis.
6. Once a policy is selected, the Default Collector group will show up on the right-hand side, as
shown below.
8. On the right-hand side of the Policies Settings page, check that the collectors (which include
the Alice victim PC) in the Default Collector Group are assigned to the Default
Communication Control Policy.
Success
Now that the Alice victim PC now has a FortiEDR collector installed and is added to the correct
security collector groups, it can detect malicious software runs on the machine.
High-security collector group (used by EDR playbooks to isolate infected systems for
forensic analysis)
Question:
A user calls the help desk and cannot print. What can be done by the help desk to see if
FortiEDR is impacting the printing process?
Hint: 1 Points: 0
Hint Text:
Hint
The user needs to be put in a group that doesn’t restrict them, but simulates the restrictions so
that the help desk can look at what events are being generated.
This will help determine communications control rule might be preventing the print job.
----------------------- Answer Section -----------------------
Answer: radio
Answer Text:
Answer
Simulation (Notification Only): FortiEDR only issues an alert for all connections that violate a
rule in a FortiEDR security policy. In simulation mode, FortiEDR does not secure
communications. FortiEDR comes pre-configured in simulation mode and can be used for
troubleshooting, but not security, until simulation mode is switched to prevention mode..
Answer Key:
✔ 1. Simulation group
✘ 2. High security group
✘ 3. Printing security group
Index: 3.2
Use Case: Advanced Protection
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Introduction
ACMEcorp’s security admins must reduce their attack surface by stopping advanced
malware and virtually patching healthcare and point of sale workstations until the next
scheduled maintenance.
Because threat actors target users with custom malware, ACMEcorp’s endpoint
protection solution must detect malware without relying only on legacy signature-based
solutions that depend on hashes, as would be the case with first-generation endpoint
products. ACMEcorp must also defuse critical vulnerabilities in older and unpatched
workstations in a way that does not disrupt business continuity.
Security admins at ACMEcorp would like to stop all advanced malware from initially
executing on endpoint clients. For the files allowed to run, the ACMEcorp security team
would like to inspect, record, and block malicious behaviors.
Objectives
Time to Complete
Estimated: 25 minutes
Index: 3.2 (a)
Use Case: Advanced Protection
Objective Title: Malware Analysis
Points: 10
----------------------- Objective Section -----------------------
Objective Text:
Background
Because threat actors target executives with custom malware, ACMEcorp’s endpoint protection
solution must detect malware without relying only on legacy signature-based solutions that
depend on hashes, as would be the case with first-generation endpoint products.
Tasks
To demonstrate how FortiEDR’s pre and post-execution rules detect modified malware, we will
be appending characters to a known malicious file to change the hash signatures and confirm
how it is undetectable with ClamWin (a first-generation open source antivirus tool) and Virus
Total (a cloud-based antivirus database).
After modifying the executable, we will use PE Studio to find suspicious artifacts and compare
the modified executable (with the new signature, due to the appended strings) to the original
malware.
1. From the Lab Activity: Endpoint tab, access Alice machine using the RDP option.
3. Right-click, copy the following command from here and paste it in the Alice’s CMD:
5. Next, enter the following command to scan the directory using the newly generated
signature:
6. Type the following command to examine the hash of the file using certutil:
cd c:\reports
9. Append the string “fasttrack” to the newly named file by entering the following command:
11. This new modified file is not recognizable by ClamAV, as evidenced by the following
commands:
12. Open Frhed (a hex editor located on the Alice victim machine desktop).
13. Click File > Open
14. Open the file c:\reports\tspresport-fasttrack.exe. Scroll down and note “fasttrack” string at
the very end of the file.
Note: A simple modification like this might not thwart all commercial scanners that use
non-signature based detection, such as file heuristics or static analysis. The next exercise
will demonstrate how one might look inside a file to find questionable components.)
15. On Alice Desktop, right-click PE Studio icon and Run as administrator. Click Run
17. Click Indicators on the left and note the blacklisted items inside the file (levels 1,2,3)
18. Click Imports on the left panel. Click blacklist column heading to sort items and note the
blacklisted items (x).
19. Click strings on the left panel. Click blacklist column heading to sort items and note the
blacklisted strings (x).
Note: Simply appending a few characters to the end of the file may evade some
signature-based antivirus programs registered with Virus Total, even though PE Studio
clearly shows it has some malicious looking components inside.
Note: If there is a delay with PE Studio connecting us to Virus Total, manually search the
webpage for hashes (www.virustotal.com). PE Studio depends on open access to the free
version of Virus Total, which sometimes times out with excessive use.
Stop and Think
In your environment, ask yourself two key questions:
What defenses are in place if threat actors sent your company’s executives custom
made malware?
Which lines of defense (firewalls, secure email gateways, desktop AV) might depend on
signature-based protection in detecting malware?
The limitations of signature-based solutions compel security admins to think more carefully
about pre and post-execution policies on protected endpoints. Using FortiEDR, we can prevent
malicious files from executing or even allowing them to execute and safely record their
interaction with other operating systems' files.
Question:
Which of the following artifacts might be helpful when initially analyzing malware with a tool
like PE Studio (choose all that apply)?
Hint: 1 Points: 0
Hint Text:
Hint 1
Malicious software often attempts to hide its intents in order to evade early detection and
static analysis. In doing so, it often leaves suspicious patterns, unexpected metadata, anomalies
and other valuable indicators.
Answer: checkbox
Answer Text:
Answer
Malicious software often attempts to hide its intents in order to evade early detection and
static analysis. In doing so, it often leaves suspicious patterns, unexpected metadata, anomalies
and other valuable indicators.
Answer Key:
✔ 1. suspicious patterns
✔ 2. unexpected metadata
✔ 3. anomalies
Index: 3.2 (b)
Use Case: Advanced Protection
Objective Title: Pre-Exec Protection
Points: 10
----------------------- Objective Section -----------------------
Objective Text:
Background
Security admins at ACMEcorp would like to stop all malware from initially executing on
endpoint clients. The following steps will create a pre-execution security policy that prevents
malware from damaging a computer.
Rules included in this policy include:
Suspicious drivers
Tasks
2. In FortiEDR, click Security Settings > Security Events > Security Policies and toggle all
policies to set to Prevention Mode (simulation mode was just for testing purposes in the
previous exercise).
Note: All Execution Prevention rules are set to block (except for those grayed out)
3. On the right-hand side, note that Default Collector Group is in the Execution Prevention
policy
4. From the web browser, access Alice machine using the web console and open Explorer
7. From the web browser, access FortiEDR using the web console.
8. Click Event Viewer and confirm that FortiEDR labeled the event as malicious or suspicious
and stopped the files from being renamed.
9. In the Classification Details pane, view the Triggered Rules: Execution Prevention
10. Expand Advanced Data to view the Event Graph for detailed information on the process
and how FortiEDR blocked it.
Question:
How might malware creators ensure that their files remain undetected in some VM sandboxed
environments?
----------------------- Hint 1 Section -----------------------
Hint: 1 Points: 0
Hint Text:
Hint
Malware creators look for the following clues that their software is being run in a virtualized
environment and not by their targeted users:
MAC OUI
Screen resolution
Answer: checkbox
Answer Text:
Answer
Answer Key:
✔ 1. MAC OUI known hypervisors (VMware etc)
✔ 2. Low CPU core count / low RAM
✔ 3. Screen resolution
✔ 4. Recent file count / Desktop file count
✔ 5. Few applications, active windows, or processes
✔ 6. Check for malware researcher tools (wireshark, procmon, sysmon, python.exe, etc)
Index: 3.3
Use Case: Events, Forensics, and Reports
Objective Title: Introduction
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Introduction
Objectives
Time to Complete
Estimated: 25 minutes
Index: 3.3 (a)
Use Case: Events, Forensics, and Reports
Objective Title: PUPs and Suspicious Files
Points: 10
----------------------- Objective Section -----------------------
Objective Text:
Tasks
The files in this exercise are not technically malware, but they may pose some risks to
security-conscious enterprises, as they might communicate to other countries or possibly are a
platform for other potentially unwanted programs.
1. From the web browser, access Alice machine using the web console.
2. Open the install folder on the desktop. Right-click on the BitTorrent.exe file and install as
administrator with default options.
3. Access is denied pop-up would appear. A “execution blocked” popup may also appear in the
lower right hand side of the screen. Close it by hitting the Got It button.
Note: The EDR block pop-up in your lab might be different from screenshot below.
4. In the same install folder, right click on the TeamViewer_Setup.exe and install as
administrator. Select default installation.
5. FortiEDR will not allow the installation, and a popup will appear on the bottom right hand
side. Click OK on the popup and close the installer.
Note: When you Close out installer, you may see another error messaging saying that saying
“TeamViewer service could not be started. Installation will be continued.” If more FortiEDR
popups appear, click Got It as before to close them.
6. In the same install folder on the desktop, right-click and install (as administrator) the
SteamSetup.exe file.
Welcome screen
Language: English
Install location: c:\program files\steam
8. Close the popup from FortiEDR by clicking on the Got It message, and the Finish button on
the steam wizard. Close any other error dialogue boxes that pop up.
Note: We will not be doing anything with these programs on Alice. The rest of this lab
will be examining the event logs generated by these programs.
Question:
Which of the following tools not be appropriate for ordinary users in enterprise environments?
Hint: 1 Points: 0
Hint Text:
Hint
ALL of the tools below are generally considered questionable for most enterprise users
(excluding appropriate IT and security employees)
Netcat
Wireshark
Nmap
Nessus
IRC
Answer: checkbox
Answer Text:
Answer
ALL of the tools below are generally considered questionable for most enterprise users
(excluding appropriate IT and security employees)
Answer Key:
✔ 1. nc (netcat)
✔ 2. wireshark
✔ 3. nmap
✔ 4. nessus
✔ 5. irc
Index: 3.3 (b)
Use Case: Events, Forensics, and Reports
Objective Title: Event Analysis
Points: 10
----------------------- Objective Section -----------------------
Objective Text:
Tasks
1. From the web browser, access FortiEDR using the web console.
3. Click on each of the alerts associated with the programs ran earlier and note the Device the
event was detected on the endpoint.
4. Find and click the endpoint device (Alice) to see the alerts associated with it.
On the right side of the EDR GUI in the CLASSIFICATION DETAILS pane, click the triangle
( ) in the Triggered Rules window next to the Exfiltration Prevention to expand it for
more details.
Note: The Exfiltration Prevention engine triggered the rule Exfiltration Prevent – PUP
(Potentially Unwanted Program) rule for the TeamViewer installation file, which is often
used in MITRE techniques such as Credential Dumping and Input Capture.
FortiEDR solution indicates the rule that triggered an event and detailed information about
the rule (description of the rule, MITRE techniques and possible remediation steps). This
information helps bridge knowledge gaps and help SOC admins quickly remediate and
resolve issues.
6. At the bottom left corner of the screen, click the triangle ( ) in the ADVANCED DATA pane
to expand for an Event Graph data related to the highlighted event.
This graph shows the point at which FortiEDR blocked the TeamViewer process and all the
steps leading up to it. This event in particular included:
ProcessExplorer.exe created the process TeamViewer_Setup.exe
TeamViewer_Setup.exe created the process ProcessTeamViewer.exe
ProcessTeamViewer.exe created the process ProcessTeamViewer.exe (again)
ProcessTeamViewer.exe created the process ProcessTeamViewer_Service.exe
FortiEDR blocked the process
7. Repeat these same steps for the other malicious and PUP events generated by BitTorrent
and Steam.
Steam: (In the Event Viewer, look for an alert that triggered Steam event)
BitTorrent: (In the Event Viewer, look for an alert that triggered BitTorrent event)
Events in FortiEDR can be organized by either processes or devices, depending on which view is
selected. When might each view help investigate security events?
(Note: Some events may not need immediate attention, yet a SOC admin might click on them to
get more information before moving on to another event. This can lead to a mixture of read
and unread events within the Event Viewer. Clicking the filter at the top of the list ( ) allows
you to hide some events, including the Read events.
If multiple admins are using the system, the read/unread status is local to the individual admin
and not system-wide. The upcoming objective will demonstrate how to use the Handled and
Archive statuses, which are system-wide flags.)
Question: When does an Alert or Device change its status from Unread to Read? (Pick one)
----------------------- Answer Section -----------------------
Answer: radio
Answer Text:
Answer Key:
✘ 1. Once any event within the alert has been read
✔ 2. Once all events within the alert have been read
✘ 3. When the alert has been flagged as Handled
✘ 4. After you exit from the FortiEDR Manager GUI
Index: 3.3 (c)
Use Case: Events, Forensics, and Reports
Objective Title: Forensics
Points: 10
----------------------- Objective Section -----------------------
Objective Text:
Tasks
1. From the web browser, access FortiEDR using the web console.
2. Click Event Viewer.
3. Now, click on an event that triggered a PUP classification in your lab environment.
4. In our example below, it’s SteamService.exe. But, in your lab, the results might vary and a
different program could have been classified as PUP, for example: teamviewer.exe
Note: Your classifications may be slightly different, as FortiEDR sometimes takes additional
context to label a file as pup or malicious or suspicious. Depending on how far the
installation program was allowed to run (or re-run), there may be multiple events with one
program as well.
4. Click the triangle ( ) for that event to dive into the Raw Event Details screen. In this
example, Steam Event (SteamService.exe) event
4. In this new view are raw events, each with their unique ID.
5. At the bottom of the screen, click the triangle ( ) to expand the ADVANCED DATA pane
showing the Event Graph how FortiEDR blocked multiple events and the service.
6. Click the back button ( ) to return to the Events List.
7. Click the checkbox ( ) for the Steam event and then click the Forensics button
Note: You will be in the Flow Analyzer View, similar to the Event Graph available from the
Event Viewer tool.
9. Click the Stacks View icon ( ) in the upper right corner of the screen.
Note: There is a lot of detailed information about the event available here in Forensics
under the Stacks View. Each of the steps leading up to the event will be listed and can be
clicked.
Start with the first PARENT PROCESS CREATION step and work your way to the right.
Pieces of useful information to determine if the event is safe or malicious include:
Source Process
Company
Target
Certificate
Hash
Note: The events in your lab might be different from the screenshot above depending on
how long was the process ran before EDR block. In the last raw event, you’ll notice the red
dot ( ) on the top line for the Steam executable file. This dot indicates where the rule was
violated that created the event.
10. On the far right, click the three vertical dots icon ( ) next to the violating process's hash.
12. This will open a new tab in the browser to the VirusTotal.com website for the entry
matching the hash.
Note: VirusTotal does not provide a definitive answer regarding the safety rating of a hash.
However, it is a reputable source that helps make an educated decision when used with
additional context.
13. Close the VirusTotal browser tab.
14. Return to the Event Viewer by clicking the tab at the top of the screen.
Question: You have loaded an event to the Forensics tab and now want to add another event
for comparison. What is the best way to do this? Feel free to try this in your environment.
Hint – As part of the process, look for this icon
Answer: radio
Answer Text:
Answer Key:
✘ 1. You can only view one event at a time in the Forensics tab
✔ 2. Go to the Event Viewer tab, select the second event and click the Forensics button to
load it into the Forensics tab
✘ 3. Go to the Event View tab and choose both events then click the Forensics tab
✘ 4. Click Add in the Forensics tab
Index: 3.3 (d)
Use Case: Events, Forensics, and Reports
Objective Title: Exceptions, Reports, and Archiving
Points: 10
----------------------- Objective Section -----------------------
Objective Text:
Tasks
Generate Reports
1. On the Event Viewer page, find and click the alert for device Alice.
2. Click the checkbox on the left for the Steam event
3. At the top of the screen, choose the Export pull-down menu and select PDF
Note: In the above example, only events within view would be exported into PDF. In many
environments, auditors may require PDF exports of all events, including those Archived.
4. A pop-up window will display on the screen showing the report being generated. Once it is
finished being developed, click the Download link to save a copy of the report.
5. At the bottom of the browser, click the saved PDF file to preview the report.
6. In the report, we have the most pertinent information about the event, including the ID,
which can be used to help locate the event later if we ever need to review it again:
ID
Device
Process
Classification
Destinations
Received
Action
Exceptions enable you to limit the enforcement of a rule, meaning to create a white list for a
specific flow of security events that was used to establish a connection request or perform a
specific operation.
FortiEDR exception management is highly flexible and provides various options that enable you
to define pinpointed, granular exceptions.
1. In the Event Viewer tab, click the Steam event so that it expands, and you can see the User,
Certificate, full Process Path, and the number of Raw data items.
2. Click the Create Exception icon ( ) to the left of the User field.
3. In the pop-up window, create the new exception with the following values, then click the
Create Exception button.
All groups
All destinations
All users
6. A pop-up window will display. Set the following fields and click the Save and Handled
button.
Set the Classification to Safe
7. The archived event will now disappear from the Events List.
Answer: radio
Answer Text:
Answer Key:
✘ 1. Apply exception to as many paths or destinations as possible, but make sure they cover
as few users as possible
✘ 2. Always file a ticket with Fortinet before creating an exception
✔ 3. Apply exceptions to a minimal number of destinations and paths
✘ 4. Create exceptions for as many events as possible to prevent productivity inhibitors
Index: 4.0
Use Case: Conclusion
Objective Title: Review
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Review
After completing this Fast Track module, you should now understand how:
1. FortiClient EMS protects the endpoint and integrates into the Fortinet Security Fabric for
increased visibility and control of the network.
2. FortiEDR provides endpoint protection for pre and post infection scenarios with extensive event
monitoring, alerting and forensic investigation capabilities.
Index: 4.0 (a)
Use Case: Conclusion
Objective Title: End of Session
Points: 0
----------------------- Objective Section -----------------------
Objective Text:
Thank You
Please take a moment to complete our short survey located within web portal tab above.