Discovery Flashcards

(29 cards)

1
Q

Where is discovery information stored?

A

in CMDB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When does FortiSIEM gain the ability to discover all physical and virtual infrastructure?

A

After entering admin credentials as well as a range of IP addresses that exist on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is typically used for network device configuration pulling?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which FortiSIEM components are capable of device discovery?

A

Supervisor or a Dedicated collector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is mandatory for discovering Linux servers?

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SSH typically used for when discovering Linux server?

A

specific memory paging and disk I/O utilization values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which FortiSIEM components can discover Linux servers?

A

only the Supervisor or a Dedicated collector perform discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the process of discovering Windows machines?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three possible ways of sending logs/events from a Windows machine?

A
  1. WMI through RPC (TCP 135)
  2. Third party agents (Snare) via syslog (UDP/514, TCP/1470)
  3. FortiSIEM Agent (TCP/443)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What needs to be used for flat file log collection to collect log files such as DNS and DHCP?

flat file - logs written to local files (e.g., .log or .txt) like DHCP or DNS

A

Agent - not a feature of WMI or SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is the collection done if a device is discovered by the Supervisor?

A

FortiSIEM will load balance collection amongst the FortiSIEM cluster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is the collection done if a device is discovered by the Collector?

A

a one-to-one relationship is formed between the discovered device and Collector - only the discovering collector performs the data collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should be the destination for syslog from the network device?

A

Collector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 2 types of discovery?

A
  1. Auto Log Discovery
  2. GUI Discovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does FSM do when Auto Log Discovery is used?

A

waits for devices, such as firewall or router to send its syslog messages or SNMP traps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Depending on deployment model, manually configure syslog on network devices to send the logs to …?

A
  1. Supervisor
  2. Worker
  3. Collector
17
Q

Describe the steps in the Auto Discovery Process

18
Q

How can you exclude specific IP ranges from the discovery process?

A

the Discovery tab provides a device filter to restrict what IP ranges are added from auto discovery to avoid scanning critical infrastructure like IPMI/iDRAC ranges, skip customer/test/lab segments, etc.

19
Q

How does GUI discovery work and what does it do?

A

actively collects data from devices in the network and uses user-defined credentials and various protocols for two distinct purposes:
1. discover devices, applications and users in the network and populate CMDB object groups
2. determine what metrics are available for each device and application and automatically apply collection templates

20
Q

What is the advantage of GUI Discovery over Auto Log Discovery?

A

fully populates the CMDB and determines what can be monitored on the device from performance and availability management standpoint

21
Q

Describe the GUI Discovery Process

22
Q

Where is GUI Discovery configured?

A

Admin > Setup > Discovery

23
Q

What is a pull event?

A
  • a collection template designed to pull security (SIEM-type of events) from devices
  • for security event log collection, GUI discovery applies log collection templates known as Pull Events
  • FortiSIEM can actively connect to devices or systems to fetch logs or events, rather than waiting for the device to push them
24
Q

When are pull events especially useful?

A
  1. Windows systems (via WMI or Agent)
  2. Databases (via JDBC)
  3. Cloud platforms (API-based pull)
  4. Email gateways, ticketing systems, web services, etc.
25
What needs to be done first before it is possible to use pull events?
define credentials under Admin > Setup > Credentials, which includes protocol (WMI, SSH, API), username/password or certs, port, and optionally device type
26
No information can be collected from a device without ...?
proper authentication
27
Some devices require a secondary credential to allow information collection. Why?
To collect running config of the device, SSH is required, as SNMP alone won't be able to gather configuration data
28
What is mapped to CMDB groups to determine which devices run specific applications?
processes
29