Hello
Syrine,
I would advice you leverage rsyslog to capture logs from fortigate firewall, and then install an agent on the rsyslog server to capture read the logs received from the fortigate appliance and forward it to Wazuh server for decoding.
Once you forward the fortigate log to the rsyslog server you can configure the agent localfile to read the file which the logs are written to with the example below:
<localfile>
<log_format>syslog</log_format>
<location>/var/log/<fortigate.log></location>
</localfile>
Once this is done, you can be rest assured the logs will be present on the wazuh server as wazuh has an
in-built decoder for fortigate appliance.
The other option is the remote configuration where you forward the logs directly to the wazuh server, after configuring
syslog on the fortigate appliance and set the wazuh server and the syslog server, you need to configure the Wazuh server to expect traffic from the fortigate appliance with the sample below:
<remote>
<connection>syslog</connection>
<port>514</port>
<protocol>udp</protocol>
<allowed-ips>Y.Y.Y.Y/24</allowed-ips>
<local_ip>X.X.X.X</local_ip>
</remote>
port: depends on the syslog port being used, can be customized.
protocol: UDP/TCP (has to be the same on both ends)
allowed-ips: the ip address of the fortigate appliance
local_ip: the ip address of the wazuh instance.
Ref: