Stage 4: Automation

 

 Automation 04-01 : Some malicious scanning happens in DMZ. Pls detect and automatically quarantine the scanner.

·      You will need FortiCloud Deceptor as service https://daas.forticloud.com/halo/

​              Login: groupx@fortinethk.com

Password:     Fortinet123$

 You will need FortiSOAR

​              Login: csadmin

Password:     Fortinet123$

There is 2FA needed. Please login Gmail account to get the token.

Login:                 groupx@fortinethk.com

Password:      fortinet

·      The scanning is expect to relate Windows machine (Ping, RDP & SMB).

·      Please use 192.168.100.211 as decoy.

Hints:

·      There is automation function in FortiGate. ;-)

 

Automation 04-02 : Some community (eg. police, CERT) will send threat intelligence through email. Pls automatically inject it to firewall blocking malware.

·      Create IMAP connector to email server (192.168.200.31), port 993. No need to verify SSL.

Username:   report

Password:      fortinet

·      You will need to configure Data Injection. Most of the value should be default, except type should be “Phishing”.

·      If success, some IoC should be imported in Threat Feeds. Use it to block IoC on Firewall.

Hints:

·      Remember to add schedule. Every 5 minutes should be good enough.