Fortianalyzer

LogZilla App Store application: Fortianalyzer

Overview

Fortinet FortiAnalyzer is a centralized log management and analytics appliance that collects, stores, and forwards logs from FortiGate firewalls and other Fortinet Security Fabric devices. The parser handles FortiAnalyzer-forwarded logs in the logver= key-value format, extracting security, traffic, wireless, and operational metadata.

App Function

  • Parses FortiAnalyzer-forwarded logs (logver= prefix format)
  • Extracts traffic metadata: source/destination IPs, ports, interfaces, countries, actions
  • Classifies events into Event Class/Type taxonomy for cross-vendor dashboards (SecOps, NetOps, AuthOps)
  • Maps UTM security events to MITRE ATT&CK techniques
  • Extracts wireless metadata: SSIDs, access points, client MACs
  • Applies compliance framework tags (SOX, PCI-DSS, HIPAA, GDPR, ISO-27001, NIST-800-53, etc.) based on event type
  • Strips FortiAnalyzer forwarding headers and timestamps to enable effective event deduplication
  • Provides dashboards for network traffic, security threats, and wireless operations
  • Fires triggers on actionable events: intrusions, rogue APs, VPN failures, auth failures, link down

Vendor Documentation

Prerequisites / Device Configuration

Configure FortiAnalyzer to forward logs to LogZilla via syslog:

  1. Log in to the FortiAnalyzer web interface.
  2. Navigate to System Settings > Log Forwarding.
  3. Click Create New to add a log forwarding rule.
  4. Configure the syslog server:
    • Name: LogZilla
    • Mode: Forwarding
    • Server Type: Syslog
    • Server IP: <LogZilla IP>
    • Server Port: 514 (or custom port)
    • Reliable Syslog: Enable for TCP transport
  5. Select the device logs to forward (all ADOMs or specific devices).
  6. Apply the configuration.

Verify logs are arriving at LogZilla by checking the User Tags menu for Vendor = Fortinet and Product = FortiAnalyzer.

Incoming Log Format

FortiAnalyzer-forwarded logs use a key-value format with a logver= prefix header:

Template:

text
logver=<version> timestamp=<epoch> devname="<device>"
devid="<device_id>" vd="<vdom>" date=<YYYY-MM-DD>
time=<HH:MM:SS> eventtime=<ns_epoch> tz="<offset>"
logid="<log_id>" type="<type>" subtype="<subtype>"
level="<level>" [key=value ...]

Fields:

FieldDescription
logverLog format version
timestampUnix epoch timestamp
devnameSource device name
devidSource device serial number
vdVirtual domain
logidUnique log message identifier
typeLog type (traffic, event, utm)
subtypeLog subtype (forward, wireless, app-ctrl, etc.)
levelSeverity level

Parsed Metadata Fields

TagSourceDescription
Vendor(set)Always "Fortinet"
Product(set)Always "FortiAnalyzer"
Event ClasstaxonomyAuth, HA, Network, Security, System
Event TypetaxonomySession, Threat, Access Control, etc.
SrcIPsrcip/remipSource IP address
DstIPdstipDestination IP address
DstPortdstportDestination port (translated to name)
SrcIntsrcintfSource interface
DstIntdstintfDestination interface
UseruserUsername
ActionactionEvent action
SrcMACstamac/srcmacSource MAC address
SrcIP CountrysrccountrySource country
DstIP CountrydstcountryDestination country
Domainhostname/sniRequested hostname or SNI
MitreId(mapped)MITRE ATT&CK technique ID
MITRE Tactic(mapped)MITRE ATT&CK tactic
FA TypetypeLog type (traffic, event, utm)
FA SubtypesubtypeLog subtype
FA AppappDetected application
FA App CategoryappcatApplication category
FA Web CategorycatdescWeb filter category
FA SSIDssidWireless SSID
FA AP NameapAccess point name

High-Cardinality (HC) Tags

  • SrcIP
  • DstIP
  • User
  • SrcMAC

Log Examples

Traffic Forward (Accept)

text
logver=704112878 timestamp=1700000000 devname="FGT-1"
devid="FG100F" vd="root" date=2026-01-01
time=00:00:00 eventtime=1700000000000000000 tz="-0000"
logid="0000000013" type="traffic" subtype="forward"
level="notice" srcip=10.0.0.10 srcport=50000
srcintf="port2" dstip=10.0.0.20 dstport=53
dstintf="port3" srccountry="Reserved"
dstcountry="Reserved" proto=17 action="accept"
policyid=1 service="DNS"

Wireless Client Authentication

text
logver=704112878 timestamp=1700000000 devname="FGT-1"
devid="FG100F" vd="root" date=2026-01-01
time=00:00:00 eventtime=1700000000000000000 tz="-0000"
logid="0104043573" type="event" subtype="wireless"
level="notice" logdesc="Wireless client authenticated"
ap="AP-Office-1" ssid="CorpSecure"
stamac="00:00:5e:00:53:01" user="user1"
action="client-authentication"

Rogue AP Detected

text
logver=704112878 timestamp=1700000000 devname="FGT-1"
devid="FG100F" vd="root" date=2026-01-01
time=00:00:00 eventtime=1700000000000000000 tz="-0000"
logid="0104043563" type="event" subtype="wireless"
level="notice" logdesc="Rogue AP detected"
ssid="Evil-AP" bssid="00:00:5e:00:53:02"
action="rogue-ap-detected"

SSL VPN Login Failure

text
logver=704112878 timestamp=1700000000 devname="FGT-1"
devid="FG100F" vd="root" date=2026-01-01
time=00:00:00 eventtime=1700000000000000000 tz="-0000"
logid="0101039426" type="event" subtype="vpn"
level="alert" logdesc="SSL VPN login fail"
action="ssl-login-fail" tunneltype="ssl-web"
remip=192.0.2.10 user="user1"
reason="sslvpn_login_permission_denied"

UTM Application Control (Blocked)

text
logver=704112878 timestamp=1700000000 devname="FGT-1"
devid="FG100F" vd="root" date=2026-01-01
time=00:00:00 eventtime=1700000000000000000 tz="-0000"
logid="1059028705" type="utm" subtype="app-ctrl"
level="warning" srcip=10.0.0.10
dstip=198.51.100.10 dstport=4379 action="block"
appcat="P2P" app="BitTorrent"

FortiSwitch Link Down

text
logver=704112878 timestamp=1700000000 devname="FGT-1"
devid="FG100F" vd="root" date=2026-01-01
time=00:00:00 eventtime=1700000000000000000 tz="-0000"
logid="0115032695" type="event"
subtype="switch-controller" level="notice"
logdesc="FortiSwitch link" name="FSW-1"
switchphysicalport="port5" action="port-down"
status="down"

Dashboards

  • FortiAnalyzer: Network - Traffic analysis by action, top IPs, interfaces, ports, and countries
  • FortiAnalyzer: Security - UTM threats, MITRE techniques, blocked apps, web categories, top domains
  • FortiAnalyzer: Wireless - Wireless operations by SSID, AP, client MAC, auth events, DHCP

Triggers

TriggerDescription
MITRE ATT&CK Threat DetectedAny event with MITRE technique
SSL VPN Login FailureFailed SSL VPN authentication
Rogue AP DetectedUnauthorized wireless AP detected
RADIUS Authentication FailureWireless RADIUS auth failure
Traffic DeniedFirewall deny/drop actions
IPS Threat DetectedIntrusion prevention alert
Virus DetectedAntivirus detection
Web Content BlockedWeb filter blocked URL
Application BlockedApp control blocked app
FortiSwitch Link DownSwitch port down event
SSL Certificate AnomalySSL inspection block
User Authentication FailureFailed user authentication
Fortianalyzer | LogZilla Documentation