Watch Lists
A Watch List is a smart container of similar items such as host names, IP addresses, or user names, that are of significant interest to an administrator and need to be watched. Examples of watch lists that are already set up in FortiSIEM are
Frequent Account Lockouts – users who are frequently locked out
Host Scanners – IP addresses that scan other devices
Disk space issues – hosts with disks that are running out of capacity
Denied countries – countries with an excessive number of access denials at the firewall
Blacklisted WLAN endpoints – Endpoints that have been blacklisted by Wireless IPS systems
Typically items are added to a watch list dynamically when a rule is triggered, but you can also add items to a watch list manually. When you define a rule, you can also choose a watch list that will be populated with a specific incident attribute, as described in Adding a Watch List to a Rule, and you can use watch lists as conditions when creating reports, as described in Using Watch Lists as Conditions in Rules and Reports. Yo u can also define when an entry leaves a watch list. Typically this is time based. For example, if the rule does not trigger for that attribute for defined time-period, then the entry is removed from the watch list. Watch lists are also multi-tenant aware, with organization IDs tracked in relation to watch list items.
Creating a Watch List
System-Defined Watch Lists
Related Links
Using Watch Lists as Conditions in Rules and Reports
Adding a Watch List to a Rule
Overview of the CMDB User Interface
Creating a Watch List
- Log in to your Supervisor node.
- Go to CMDB > Watch Lists.
- Click +.
- Choose an Organization to associate with the watch list.
- Enter a Group name and Description for the watch list.
- Select an object Type for the incident attribute that will be saved to the watch list.
- Select Case Sensitive if the object type is String and you want to use case sensitivity to compare strings.
- For Values Expire in, set the time period in which items will expire from the watch if there is no activity for that time.
- Click OK.
You can now add your new watch list to a rule, so that when the rule is triggered, items will be added to the watch list. You can also use your watch list as a condition in historical search. See Adding a Watch List to a Rule and Using Watch Lists as Conditions in Rules and Reports for more information.
Related Links
Adding a Watch List to a Rule
Using Watch Lists as Conditions in Rules and Reports
System-Defined Watch Lists
FortiSIEM includes several pre-defined watch lists that are populated by system-defined rules.
Watch list | Description | Attribute
Type |
Triggering Rules |
Accounts
Locked |
Domain accounts that are locked out frequently | User
(STRING) |
Account Locked: Domain |
Application
Issues |
Applications exhibiting issues | Host Name
(STRING) |
IIS Virtual Memory Critical
SQL Server Low Buffer Cache Hit Ratio SQL Server Low Log Cache Hit Ratio SQL Server Excessive Deadlock SQL Server Excessive Page Read/Write SQL Server Low Free Pages In Buffer Pool SQL Server Excessive Blocking Database Server Disk Latency Critical SQL Server Excessive Full Scan SQL Server scheduled job failed High Oracle Table Scan Usage High Oracle Non-System Table Space Usage Oracle database not backed up for 1 day Exchange Server SMTP Queue High Exchange Server Mailbox Queue High Exchange Server RPC Request High Exchange Server RPC Latency High Oracle DB Low Buffer Cache Hit Ratio Oracle DB Low Library Cache Hit Ratio Oracle DB Low Row Cache Hit Ratio Oracle DB Low Memory Sorts Ratio Oracle DB Alert Log Error Excessively Slow Oracle DB Query Excessively Slow SQL Server DB Query Excessively Slow MySQL DB Query |
Availability
Issues |
Servers, networks or storage devices or Applications that are exhibiting availability issues | Host Name
(STRING) |
Network Device Degraded –
Lossy Ping Response Network Device Down – No Ping Response Server Degraded – Lossy Ping Response Server Down – No Ping Response Server Network Interface Staying Down Network Device Interface Flapping Server Network Interface Flapping Important Process Staying Down Important Process Down Auto Service Stopped Critical network Interface Staying Down EC2 Instance Down Storage Port Down Oracle Database Instance Down Oracle Listener Port Down MySQL Database Instance Down SQL Server Instance Down Service Staying Down – Slow Response To STM Service Down – No Response to STM Service Staying Down – No Response to STM |
DNS Violators | Sources that send excessive DNS traffic or send traffic to unauthorized DNS gateways | Source IP | Excessive End User DNS Queries to Unauthorized DNS servers
Excessive End User DNS Queries Excessive Denied End User DNS Queries Excessive Malware Domain Name Queries Excessive uncommon DNS Queries Excessive Repeated DNS Queries To The Same Domain |
Denied
Countries |
Countries that are seeing a high volume of denials on the firewall | Destination
Country (STRING) |
Excessive Denied
Connections From An External Country |
Denied Ports | Ports that are seeing a high volume of denies on the firewall | Destination
Port (INT) |
Excessive Denied Connection
To A Port |
Environmental
Issues |
Environmental Devices that are exhibiting issues | Host name
(String) |
UPS Battery Metrics Critical
UPS Battery Status Critical HVAC Temp High HVAC Temp Low HVAC Humidity High HVAC Humidity Low FPC Voltage THD High FPC Voltage THD Low FPC Current THD High FPC ground current high NetBoz Module Door Open NetBotz Camera Motion Detected Warning APC Trap Critical APC Trap |
Hardware
Issues |
Servers, networks or storage devices that are exhibiting hardware issues | Host Name
(String) |
Network Device Hardware
Warning Network Device Hardware Critical Server Hardware Warning Server Hardware Critical Storage Hardware Warning Storage Hardware Critical Warning NetApp Trap Critical Network Trap |
Host
Scanners |
Hosts that scan other hosts | Source IP | Heavy Half-open TCP Host
Scan Heavy Half-open TCP Host Scan On Fixed Port Heavy TCP Host Scan Heavy TCP Host Scan On Fixed Port Heavy UDP Host Scan Heavy UDP Host Scan On Fixed Port Heavy ICMP Ping Sweep Multiple IPS Scans From The Same Src |
Mail Violators | End nodes that send too much mail or send mail to unauthorized gateways | Excessive End User Mail to
Unauthorized Gateways Excessive End User Mail |
|
Malware
Found |
Hosts where malware found by Host IPS /AV based systems and the malware is not remediated | Host Name
(String) |
Virus found but not remediated
Malware found but not remediated Phishing attack found but not remediated Rootkit found Adware process found |
Malware
Likely |
Hosts that are likely to have malware – detected by network devices and the determination is not as certain as host based detection | Source IP or
Destination IP |
Excessive Denied
Connections From Same Src Suspicious BotNet Like End host DNS Behavior Permitted Blacklisted Source Denied Blacklisted Source Permitted Blacklisted Destination Denied Blacklisted Destination Spam/malicious Mail Attachment found but not remediated Spyware found but not remediated DNS Traffic to Malware Domains Traffic to Emerging Threat Shadow server list Traffic to Emerging Threat RBN list Traffic to Emerging Threat Spamhaus list Traffic to Emerging Threat Dshield list Traffic to Zeus Blocked IP list Permitted traffic from Emerging Threat Shadow server list Permitted traffic from Emerging Threat RBN list Permitted traffic from Emerging Threat Spamhaus list Permitted traffic from Emerging Threat Dshield list Permitted traffic from Zeus Blocked IP list |
Port Scanners | Hosts that scan ports on a machine | Source IP | Heavy Half-open TCP Port
Scan: Single Destination Heavy Half-open TCP Port Scan: Multiple Destinations Heavy TCP Port Scan: Single Destination Heavy TCP Port Scan: Multiple Destinations Heavy UDP Port Scan: Single Destination Heavy UDP Port Scan: Multiple Destinations
|
Policy
Violators |
End nodes exhibiting behavior that is not acceptable in typical Corporate networks | Source IP | P2P Traffic detected
IRC Traffic detected P2P Traffic consuming high network bandwidth Tunneled Traffic detected Inappropriate website access Inappropriate website access – multiple categories Inappropriate website access – high volume Inbound clear text password usage Outbound clear text password usage Remote desktop from Internet VNC From Internet Long lasting VPN session High throughput VPN session Outbound Traffic to Public DNS Servers |
Resource
Issues |
Servers, networks or storage devices that are exhibiting resource issues: CPU, memory, disk space, disk I/O, network I/O, virtualization resources – either at the system level or application level | Host Name
(STRING) |
High Process CPU: Server
High Process CPU: Network High Process Memory: Server High Process Memory: Network Server CPU Warning Server CPU Critical Network CPU Warning Network CPU Critical Server Memory Warning Server Memory Critical |
Network Memory Warning
Network Memory Critical
Server Swap Memory Critical
Server Disk space Warning
Server Disk space Critical
Server Disk Latency Warning
Server Disk Latency Critical
Server Intf Util Warning
Server Intf Util Critical
Network Intf Util Warning
Network Intf Util Critical
Network IPS Intf Util Warning
Network IPS Intf Util Critical Network Intf Error Warning
Network Intf Error Critical Server Intf Error Warning
Server Intf Error Critical
Virtual Machine CPU Warning
Virtual Machine CPU Critical
Virtual Machine Memory
Swapping Warning
Virtual Machine Memory
Swapping Critical
ESX CPU Warning
ESX CPU Critical
ESX Memory Warning
ESX Memory Critical
ESX Disk I/O Warning
ESX Disk I/O Critical
ESX Network I/O Warning
ESX Network I/O Critical Storage CPU Warning
Storage CPU Critical
NFS Disk space Warning
NFS Disk space Critical
NetApp NFS Read/Write
Latency Warning
NetApp NFS Read/Write Latency Critical
NetApp CIFS Read/Write
Latency Warning
NetApp CIFS Read/Write Latency Critical
NetApp ISCSI Read/Write Latency Warning NetApp ISCSI Read/Write Latency Critical NetApp FCP Read/Write Latency Warning NetApp FCP Read/Write Latency Critical NetApp Volume Read/Write Latency Warning NetApp Volume Read/Write Latency Critical EqualLogic Connection Read/Write Latency Warning EqualLogic Connection Read/Write Latency Critical Isilon Protocol Latency Warning |
|||
Routing
Issues |
Network devices exhibiting routing related issues | Host Name
(STRING) |
OSPF Neighbor Down
EIGRP Neighbor down OSPF Neighbor Down |
Scanned
Hosts |
Hosts that are scanned | Destination
IP |
Half-open TCP DDOS Attack
TCP DDOS Attack Excessive Denied Connections to Same Destination |
Vulnerable
Systems |
Systems that have high severity vulnerabilities from scanners | Host Name
(STRING) |
Scanner found severe vulnerability |
Wireless LAN
Issues |
Wireless nodes triggering violations | MAC Address
(String) |
Rogue or Unsecure AP detected
Wireless Host Blacklisted Excessive WLAN Exploits Excessive WLAN Exploits: Same Source |