Important Details Flashcards

(47 cards)

1
Q

Basic SQL commands

A

SELECT, INSERT, UPDATE, DELETE. These are the declarative verbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SELECT statement order

A

FROM: specifies the table
WHERE: specifies the conditions
GROUP BY: groups results by one or more columns
ORDER BY: orders the results by rows
LIMIT: limits the number of records returned based on a specified value
OFFSET: offsets the results by the number specified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ORDER BY syntax

A

ORDER BY column_name/column_number asc/desc

Ascending is default for this clause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NULLIF

A

Takes two arguments. If the first two are equal, then NULL is returned. otherwise, the first argument is returned. NULL represents unknown data, not zero. Used with SELECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Aggregate Function vs Normal Functions

A

Aggregate uses the entire column of data as their input and produce a single output. Normal operates on each element in the column

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COALESCE

A

Returns the first non-NULL expression among its arguments. NULL is returned only if all arguments are NULL. Used with SELECT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Aggregate function examples

A

Function(Expression)
AVG
COUNT - number of rows, even if some columns contain NULL value
FIRST
LAST
MAX
MIN
SUM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Out of ordinary operators

A

% - Modulus. Divides left hand operand by right hand operand and returns remainder
<> - Not equal to
!< Not less than
!> not greater than

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to retrieve root domain of a device within a statement

A

root_domain(hostname)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fabric with multiple FGTs

A

The fabric eliminates duplicate logs. Each fortigate will generate logs as long as the event wasn’t logged by the previous fortigate along the path of traffic. Consider what configuration the fortigate has according to the question. Such as if only one of the FGT is performing SNAT, then that FGT will be the only one that generates the SNAT traffic log. Apply for other things like web filtering, wherever it is being performed, it will generate the UTM logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FortiAnalyzer Fabric

A

Two Modes: Supervisor - One per fabric, acts as the root
Member - Sends information to supervisor. Does NOT forward their logs to the supervisor
Must be configured in same time zone.
Collectors cannot be members.

Supervisor includes only the following modules:
Device Manager
Log view
Incident & Events
System Settings
Management Extensions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ADOMS are enabled by default (T or F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Log Phases

A

1: Raw - logs received from registered device. No immediate analytic support, viewable in Log Browse, .log file type
2: Indexed (Analytics Logs) - Added to SQL database and indexed. Has immediate analytic support, considered “online.” Can view them in Log View, FortiView, Events, and Reports
3: Archived - Compressed and rolled over in log file saved with .gz extension. No immediate analytic support. Considered “offline,” viewable in Log Browse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Log View Modes

A

Filter(GUI) and Text(Manual)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Can you sort and customize Raw logs? (Yes or No)

A

No. Only formatted logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You can only disable FortiView via CLI? (T or F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IOC

A

Indicators of Compromise: Requires a FortiGuard subscription

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Two IOC statuses

A

Infected: Indicates a real breach. A match or matchers of the blacklisted IPs or domain generation algorithms (DGAs) have been found in the web logs

Suspicious: Indicates a possible breach with varying degrees of confidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Two Categories to filter IOC entries

A

Blocklist: Indicates items marked as infected

Suspicious: indicates a match was found in the suspicious list in the IOC database. FortiAnalyzer flags the endpoint for further analysis, compares the flagged log entries with the endpoint’s previous statistics for the same day, and then updates the score. If the score exceeds the threshold, that endpoint is listed or updated in Compromised Hosts

19
Q

Log Fetching Details

A

Log Fetching can only happen between two FortiAnalyzer devices. A FortiAnalyzer device can perform either the fetch server or client role, and it can perform two roles at the same time with different FortiAnalyzer devices at the other end.

You can establish only one log-fetching session at a time between two FAZ devices

Should run same firmware version
Source and Destination ADOM are of the same type
Destination ADOM must have enough space allocated for the incoming logs
Must add the devices to Device manager before you can see their logs in the client
Data Policy on the client must retain logs of the specified time period

20
Q

Command to see the SQL insertion status

A

diagnose sql status sqlplugind

21
Q

Log Rate vs Message Rate

A

One log message can consist of multiple logs in LZ4 format. Thus, it is normal for the msgrate to be lower then lograte

22
Q

Insert Rate vs. Receive Rate

A

Insert Rate = SQL Insertion Rate
Handled by sqlplugind
Receive Rate = Raw Receiving Rate
Handled by fortilogd

23
Q

Log Insert Lag Time

A

Amount of time between log received and log inserted in the database

24
MEA
Management Extension Application, Licensed applications and run them on FortiAnalyzer Two Options are FortiSOAR and FortiSIEM
25
Event Handlers
Looks for specific conditions in the logs Can enable or disable them, comes with predefined event handlers Disabled handlers do not generate events
26
Event Handler Aggregates
Aggregate Expression has three options: COUNT - A minimum threshold count of matching logs COUNT_DISTINCT - Select field that must be distinct SUM - multiple options like duration, sent/received bytes, and sent/received packets Aggregate Duration - The minimum threshold in minutes to generate events These two work together. The number of matching logs (expression) must occur in the number of (duration) in order to generate an event
27
Event Status
Unhandled - The security risk is not mitigated or contained, so it is considered open. Examples: IPS/AV log with action=pass, Botnet and IoC events are also considered Unhandled Contained - The risk source is isolated. AV log with action=quarantine Mitigated - The security risk is mitigated by being blocked or dropped. IPS/AV log with action=block/drop Blank - Other Scenarios. Both allow and block actions can be seen in logs associated
28
Out of ordinary text filters for Event Handlers
~ Contained !~ not contained
29
Importing/Exporting Event Handlers
By default, they are restricted to the ADOM where they were created. Must export them or create them in different ADOMs. Can export them to zipped, text, or CLI configuration. If name exists already, options are to rename, replace, or skip import
30
Outbreak Detection Service
Licensed Feature Allows customers to receive information about malware outbreaks Automatically downloads new event handlers and reports related to outbreaks
31
Report Elements
A report is a set of data organized in charts. Charts consist of two elements: Datasets - SQL SELECT queries that extract specific data from the database Format - how the data is displayed (pie charts, bar charts, or tables)
32
FROM is the only mandatory clause for a SELECT statement. (T or F)
True
33
Templates
Specifies the layout - text, charts, and macros- to include in the report that uses it. FAZ provides predefined templates. Can clone predefined templates or create custom ones. Can't edit or delete predefined templates They don't contain any data. Data is added to the report when you generate it. Doesn't contain report settings, must edit those directly
34
Predefined Reports
can run these with default settings, or edit settings such as: Time period Devices Filters Report Schedule(on demand or scheduled) cannot adjust schedule from calendar, must be done from the specific configuration of the report
35
Macros
Specify which data to extract from the logs. They represent dataset queries in abbreviated form. Can insert them as data into templates and reports ADOM Specific!
36
Default Charts and Datasets
The Chart Library contains hundreds of charts, cannot edit default charts Datasets Library contains hundreds of datasets, cannot edit default datasets Can clone and edit just like templates and reports.
37
Export to Report Chart
Allows you to automatically build a dataset and chart based on a filtered search result
38
External Storage for Reports
Requires configuration of a mail server to email reports Can also upload generated reports to a server (FTP/SFTP/SCP) Configure output profiles per ADOM, then enable notification for each report
39
hcache
SQL Hard Cache - Must be built before FAZ can generate report. Increases report generation time and uses system resources. If no new logs are received for the reporting period, the hcache doesn't need to rebuild. Enable auto-cache - Automatically updates hcache when new logs come in and FAZ generates new log tables.
40
Grouping Reports
Benefits: Reduces the number of hcache tables, improves auto-cache completion time. CLI: configure system report group
41
Moving Reports between ADOMs
Each ADOM has its own reports, libraries, and advanced settings. ADOMs must be of the same type when importing
42
Attach Reports to Incidents
Manually from an existing reports Manually from an existing incident Automatically through playbook automation
43
Playbook Triggers
The first thing that must be configured when creating a playbook EVENT_TRIGGER INCIDENT_TRIGGER ON_SCHEDULE ON_DEMAND
44
Fabric Connectors
Allows playbooks to interact with devices in the Fabric and standalone devices. Only the local(FAZ) connector is ready to be used by default. Green: Connection successful Black: Connection Unknown Red: Connection Down Other connectors available: EMS, FortiOS, FortiGuard, FortiMail, FortiCASB, others Type of connector used determines the available actions. In order to see actions related to the FortiOS connector, you must enable an automation rule using the Incoming Webhook Call trigger on the FortiGate side
45
Playbook Variables
Output variables: Output of previous task is the input of current task Trigger Variables: Use some of the information from the trigger to filter the action in the task
46
Importing and Exporting Playbooks
Playbooks are defined per ADOM IMPORTING: If playbook has same name as existing playbook, FAZ creates a new name that includes a timestamp. They are imported with the same status as when they were exported(enable or disabled) EXPORTING: The connectors can be included, resulting file uses JSON format If you need to be able to read the contents of the JSON file in plain text, you must choose the text version during the export process