Asset Center
The Fabric View > Asset Center > All pane is the central location for security analysts to view endpoint and user information to make sure they are compliant. Endpoints are important assets in a network as they are the main entry points in a cybersecurity breach.
The Asset Center pane is useful for the following:
- Incident response: check assets that are infected or vulnerable as part of your SOC analysis and incident response process.
- Compliance: identify unknown and non-compliant users and endpoints.
The Asset Center pane lists all endpoints and users from relevant logs and correlates them with FortiAnalyzer modules. Sort by the Vulnerabilities column to see which endpoints and users have the highest vulnerabilities.
Column |
Description |
---|---|
Endpoint Name |
Endpoint host name. |
Tags |
Tags are used to group and identify assets to assist SOC analysts with incident management and prioritization. Tags can be defined by FortiClient EMS or when creating subnets and subnet groups in FortiAnalyzer. FortiClient EMS tags are determined based on the Classification Tag assigned in FortiClient EMS. Tags are displayed in the Asset Center when a FortiSoC playbook retrieves information about that endpoint using the Get Endpoints task available with a FortiClient EMS connector. See Connectors. Subnet tags are configurable when creating new subnets and subnet groups in FortiAnalyzer. See Subnets. |
User |
The name of the user. Click the name to view the corresponding user information in the Identity Center pane. |
MAC Address |
Endpoint MAC address. |
IP Address |
IP address the endpoint is connected to. A user might be connected to multiple endpoints. |
FortiClient UUID |
Unique ID of the FortiClient. |
Hardware / OS |
OS name and version. |
Software |
Click Details to view information about software installed on an endpoint when available. Endpoint software information is retrieved when a playbook runs the Get Software Inventory action using the FortiClient EMS connector. See Configuring playbook automation. |
Vulnerabilities |
The number of vulnerabilities for critical, high, medium, and low vulnerabilities. Click the vulnerability to view the name and category. Right-click the vulnerability to view available on-demand actions using a security fabric connector. Endpoint vulnerability information is retrieved when a playbook runs the Get Vulnerabilities action using the FortiClient EMS connector. See Configuring playbook automation. |
Last Update |
The date and time the log was updated. |
Use the toolbar to select a Security Fabric, time period, and columns.
If there is no FortiClient in your installation, then endpoint and end user information is limited.
|
To filter the entries using filters in the toolbar:
-
Specify filters in the Add Filter box.
-
Regular Search: In the selected summary view, click Add Filter and select a filter from the dropdown list, then type a value. Click NOT to negate the filter value. You can add multiple filters and connect them with “and” or “or”.
-
Advanced Search: Click the Switch to Advanced Search icon at the end of the Add Filter box. In Advanced Search mode, enter the search criteria (log field names and values). Click the Switch to Regular Search icon to go back to regular search.
-
To create a custom view in the toolbar:
- In the toolbar, click the column settings icon, and select the columns you want to display.
- Click Custom View. The Save as New Custom View dialog is displayed.
- In the Name field, enter a name for the custom view, and click OK. The view is saved under Custom View in the tree menu.
To change the visibility of a custom view:
- If using ADOMs, ensure that you are in the correct ADOM.
- In the tree menu, select the menu icon next to your custom view or right click the view, and select Share with Others.
- Set the Privacy field to On: Public or Off: Private, and click OK.
To download the entries as a CSV file:
- Click Tools > Download.