Version 25.3.c
New functionality
DPI Dashboards
Three new dashboards have been added for Fortinet DPI:
- DPI - Threats
- DPI - AppCtrl
- DPI - OT
These dashboards are available from the Dashboard menu but will only display data when Fortinet DPI is enabled on the Sensor Settings page. The dashboards display DPI events from either the past 24 hours or the past 7 days, depending on the dashboard. The data can be refreshed at any time. You can view the dashboards as a chart, pie chart, or table, and export the data as a CSV file. DPI dashboards are useful when starting an investigation. For example, if an IP address is flagged in one of the dashboards, you can enter it in the Global Search field or use it to create a query in Private Search.
DPI - Threats
The DPI - Threats dashboard displays detected threats and their corresponding counts. The dashboard provides a summary of the most frequently detected threats and highlights the IP addresses that are triggering the highest number of signatures. When an IP address triggers a large number of IPS signatures, it’s a strong indicator that the IP should be investigated further.
This dashboard contains three monitors:
| Top Threats |
This monitor queries high-severity IDS alerts (severity level 4) detected by DPI, where either the source or destination is internal. It excludes alerts triggered by device tagged as Scan and Nessus and filters out two noisy Apache-related signatures. The results are grouped by alert signature, helping identify which threat signatures are most frequently triggered. |
| Top IP | This monitor retrieves high-severity IDS alerts (severity level 4) detected by DPI, where either the source or destination is internal. It excludes alerts triggered by devices tagged as Scan or Nessus and filters out two noisy Apache-related signatures. The results are grouped by source IP, helping identify which internal hosts are generating the most IDS alerts. |
| Botnet from internal | This monitor identifies outbound botnet-related DPI alerts where the source IP is internal. It groups the results by both the internal source IP and the specific botnet signature that was triggered, helping pinpoint which internal hosts are attempting to communicate with known botnets. |
DPI - AppCtrl
The DPI - AppCtrl dashboard displays detections of applications and protocols used by IP addresses, such as DNS, HTTP, and other common services. This provides insight into the types and volume of traffic an IP address is generating.
| Top Application - Exclude Popular (24H) |
This monitor filters out common or expected traffic (such as DNS, ICMP, ping, and browser activity) to highlight less typical application usage. The results are grouped by application signature, helping identify less common or potentially suspicious applications being used internally |
| Top Application - All (24H) |
This monitor includes all detected application types, including browser activity, offering a complete view of application traffic. The results are grouped by application signature, allowing you to see which applications are being detected across internal traffic, without the noise from automated scanners. This helps focus on legitimate or potentially suspicious application usage within the network. |
DPI - OT
The DPI - OT dashboard provides visibility into OT (Operational Technology) protocols used in industrial control systems. Any OT-related activity detected on the network will be tracked and displayed here. The dashboard highlights specific OT protocols (such as Bacnet, Profinet, and DNP3) with MP3 being one of the more commonly observed.
| OT Protocol |
This monitor displays DPI alerts categorized as OT - Protocol, which relate to industrial control system protocols, where either the source or destination IP is internal. It excludes alerts triggered by device tagged as Scan and Nessus. The results are grouped by both the OT protocol signature and the source IP, allowing you to:
This helps in monitoring legitimate OT activity and detecting unusual or unauthorized use of industrial protocols. |
| OT Threats |
This monitor displays DPI alerts categorized as OT - Threats, which indicate suspicious or malicious activity targeting Operational Technology (OT) systems. It filters for alerts where either the source or destination IP is internal and excludes alerts triggered by device tagged as Scan and Nessus. The results are grouped by both the OT threat signature and the source IP, allowing you to:
This helps in monitoring and investigating potential compromises or unauthorized access attempts within industrial environments. |
Improved functionality
Reports
We’ve updated the sensor_id filter in the FortiNDR Cloud Network Traffic Usage of a Sensor Report and Detections list page to a dropdown menu that displays all sensors in the account. The dropdown is divided into two groups: online sensors appear at the top, while other statuses are listed below. Retrieving the list of sensors may take a few moments. During this time, a spinner will appear to indicate that the request is in progress.
Entity panel
The Detections tab in the Entity Panel now displays the Active detections within the time range. In previous versions, it displayed detections triggered within the time range. In the detection details, we have replaced Account with the Created date.
Note that this update does not apply to the Detections Table page.
You can also choose the Date Range Type (Active Date, Creation Date, or Resolution Date) when selecting the time range in the date picker. This update is applied to Entity Panel throughout the portal.
Other improvements
- This release includes internal hardening updates to improve system security and resilience.
