Hello Odie,
Fortinet products usually communicate Wazuh's manager by syslog. The manager should be configurated to receive logs from an agent as described in our documentation:
Here is an example of a configuration:
<remote>
<connection>syslog</connection>
<port>514</port>
<protocol>udp</protocol>
<allowed-ips>10.0.0.16</allowed-ips>
<local_ip>10.0.0.1</local_ip>
</remote>
If this is already done just configure syslog in the agent. There are many ways to configure. I've simulated your case with rsyslog, and in rsyslog.conf i've added following configuration:
$ModLoad imfile
$InputFileName /var/log/fortinet.log
$InputFileTag fortinet
$InputFileStateFile fortinet-error
$InputFileSeverity info
$InputRunFileMonitor
*.* @
10.0.0.1:514where fortinet.log is the log's file and 10.0.0.1 is my manager.
To check it works you can activate file archives.log modifing ossec.conf. Change <logall>no</logall> to <logall>yes</logall>. For more information visit
https://documentation.wazuh.com/current/user-manual/reference/ossec-conf/global.htmlIf it works you can see Fortinet's logs in /var/ossec/logs/archives/archives.log. And Fortinet's alerts in/var/ossec/logs/alerts/alerts.log.
Here is an example of the logs:
2019 Apr 25 11:36:04 vm-ubuntu16->10.0.0.16 Apr 25 09:35:51 vm-ubuntu16 fortinet 019 Apr 05 12:00:13 mon01->10.10.24.2 date=2019-04-05 time=12:00:13 devname="HQ-Fortinet" devid="FG100DXXXXXX" logid="0100032021" type="event" subtype="system" level="alert" vd="root" eventtime=1554436813 logdesc="Admin login disabled" ui="10.88.80.3" action="login" status="failed" reason="exceed_limit" msg="Login disabled from IP 10.88.XX.X for 60 seconds because of 3 bad attempts"
And the alert is the following:
** Alert 1556184964.6293: - fortinet
2019 Apr 25 11:36:04 vm-ubuntu16->10.0.0.16
Rule: 100003 (level 7) -> 'Alert in Fortinet'
Apr 25 09:35:51 vm-ubuntu16 fortinet 019 Apr 05 12:00:13 mon01->10.10.24.2 date=2019-04-05 time=12:00:13 devname="HQ-Fortinet" devid="FG100DXXXXXX" logid="0100032021" type="event" subtype="system" level="alert" vd="root" eventtime=1554436813 logdesc="Admin login disabled" ui="10.88.80.3" action="login" status="failed" reason="exceed_limit" msg="Login disabled from IP 10.88.XX.X for 60 seconds because of 3 bad attempts"
name: "HQ-Fortinet"