top of page



Advanced Analytics

Fortinet logo-new.jpg


USD 2,900.00 excl. VAT

3 Days

PDF Outline

Who Should Attend

Security professionals involved in the management, configuration, administration, and monitoring of FortiSIEM and FortiSOAR devices

in an enterprise or service provider deployment used to monitor and secure the networks of customer organizations.

What you will learn

Course Content

In this course, you will learn how to use FortiSIEM in a multi-tenant environment. You will learn about rules and their architecture, how incidents are generated, how baseline calculations are performed,

the different methods of remediation available, and how the MITRE ATT&CK framework integrates with FortiSIEM. You will also learn how to integrate FortiSOAR with FortiSIEM.



You must have an understanding of the topics covered in the following courses, or have equivalent experience:
• NSE 4 FortiGate Security
• NSE 4 FortiGate Infrastructure
• NSE 5 FortiSIEM

It is also highly recommended that you have an understanding, or equivalent experience with, Python programming, Jinja2 template language for Python, Linux systems, and SOAR technologies.


Course Objectives

After completing this course, you should be able to:
• Identify various implementation requirements for a multitenant FortiSIEM deployment
• Deploy FortiSIEM in a hybrid environment with and without collectors
• Design multi-tenant solutions with FortiSIEM
• Deploy collectors in a multi-tenant environment
• Manage EPS assignment and restrictions on FortiSIEM
• Manage resource utilization of a multi-tenant FortiSIEM cluster
• Maintain and troubleshoot a collector installation
• Deploy and manage Windows and Linux agents
• Create rules by evaluating security events
• Define actions for a single pattern security rule
• Identify the incident attributes that trigger an incident

• Identify multiple pattern security rules and define conditions and actions for them
• Differentiate between a standard and baseline report
• Create your own baseline profiles
• Examine the MITRE ATT&CK framework integration on FortiSIEM and FortiSOAR
• Deploy FortiSIEM UEBA agents
• Examine UEBA rules, reports, event types, and windows template
• Configure clear conditions on FortiSIEM
• Analyze some out-of-the-box remediation scripts
• Configure various remediation methods on FortiSIEM
• Integrate FortiSOAR with FortiSIEM
• Remediate incidents from FortiSOAR


Course Outline


1. Introduction to Multi-Tenancy
2. Defining Collectors and Agents
3. Operating Collectors
4. Windows and Linux Agents
5. Rules
6. Single Subpattern Security Rule
7. Multiple Subpattern Rules

8. Introduction to Baseline
9. Baseline
10. UEBA
12. Clear Conditions
13. Remediation


Further information
If you would like to know more about this course please contact us

Fortinet logo-new.jpg
Fortinet logo-new.jpg
Fortinet logo-new.jpg