Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Fortisoar- Engineer'S Guide For Deployment And Configuration

Posted By: ELK1nG
Fortisoar- Engineer'S Guide For Deployment And Configuration

Fortisoar- Engineer'S Guide For Deployment And Configuration
Published 5/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.96 GB | Duration: 4h 16m

"FortiSOAR Deployment & Configuration: A Practical Engineer's Handbook for Scalable Security Orchestration"

What you'll learn

FortiSOAR Artitecture configuration and deplyment

FortiSOAR Dashboard, Schedules , Playbooks and Reports

Connectors breakdown

SOC best practices with FortiSOAR

Requirements

Compute for the Running Fortisoar

Description

Core Components of FortiSOAR Deployment: Architecture, Connectors, and PlaybooksA successful FortiSOAR implementation begins with understanding its deployment architecture, setting up reliable connectors, and designing actionable playbooks.Deployment ArchitectureFortiSOAR supports various deployment models based on organizational needs:Standalone: Suitable for small SOCs or labs, running all services on a single node.High Availability (HA): Uses an active/passive or active/active setup for redundancy and resilience.Clustered: Scales horizontally by distributing services across multiple nodes—ideal for MSSPs or large enterprise SOCs.Before deployment, ensure system sizing matches your log volume, case load, and integration scope. FortiSOAR runs best on Red Hat Enterprise Linux (RHEL) or CentOS, with prerequisites like Python 3.6+, PostgreSQL, and Docker configured during installation.Connector ConfigurationConnectors integrate FortiSOAR with external systems like SIEMs, firewalls, EDR, and CTI platforms. You can deploy them via the UI under Settings → Connectors, supplying API endpoints, credentials, and custom parameters as needed.Each connector supports a specific protocol (e.g., REST, syslog, SMTP). After configuration, always run Test Connection to validate integration. For unsupported tools, FortiSOAR provides a Python-based Connector Development Kit (CDK) to build custom connectors.Use dedicated, least-privilege service accounts and store secrets securely in the FortiSOAR vault.Playbook DevelopmentPlaybooks automate incident handling by chaining actions based on triggers, conditions, and logic. FortiSOAR’s visual playbook editor allows engineers to:Trigger workflows on alert ingestion or user actions.Include branching, loops, delays, and error handling.Leverage out-of-the-box actions from connectors or custom scripts in Python or JavaScript.Modular playbook design improves reusability and scalability. Always test playbooks in staging and include rollback or exception paths.Together, architecture, connectors, and playbooks form the operational backbone of FortiSOAR, driving intelligent, automated security response across your environment.

Overview

Section 1: Introduction

Lecture 1 Know your trainer

Lecture 2 Introduction to SOAR

Lecture 3 Workflow on key use cases in Fortisoar

Lecture 4 Architecture Breakdowm

Section 2: Downloading and Configuring the Fortisoar instance

Lecture 5 OVA download Steps

Lecture 6 Uploading the OVA and configuring

Lecture 7 License registration and uploading

Section 3: GUI and components explanations

Lecture 8 GUI breakdown

Section 4: Playbooks

Lecture 9 Playbook Editor breakdown

Lecture 10 Get reputation of IOC manual

Lecture 11 Get reputation of IOC manual only if IP is not Private

Lecture 12 Making the playbook run on create

Lecture 13 Alerts + Indicators explained how link records work together

Section 5: Fortisiem data ingestion

Lecture 14 Configuring fortisiem connector

Lecture 15 ingestion explained

Section 6: Optimization of playbook using jinja

Lecture 16 Optimization of Get reputation of IOC manual using Jinja

Section 7: Loops and preprocessing with code snippet

Lecture 17 Loop with Code snippet

Section 8: Incident Recent response playbook

Lecture 18 Phishing alert Incident response playbook

Section 9: Soc Operations with Fortisoar

Lecture 19 Que and Shift management configuration

Lecture 20 SLA break Down

Lecture 21 Creation of information gathering playbooks and populate results in comments

Lecture 22 War room Break Down

Section 10: Custom Modules

Lecture 23 Create a New Module

Lecture 24 Playbook for data ingestion in custom module

Section 11: Connectors and custom action

Lecture 25 Creating custom action in connectors

Section 12: CLI and troubleshooting

Lecture 26 Important commands and logs paths

Beginners with FortiSOAR