Where must you configure rule notifications and automated remediation on FortiSIEM?
Advanced Analytical Rules Engine: FortiSIEM's rules engine allows for complex event correlation using multiple subpatterns.
Operations for Referencing Subpatterns:
FOLLOWED_BY: This operation is used to indicate that one event follows another within a specified time window.
OR: This logical operation allows for the inclusion of multiple subpatterns, where the rule triggers if any of the subpatterns match.
AND: This logical operation requires all referenced subpatterns to match for the rule to trigger.
Usage: These operations allow for detailed and precise event correlation, helping to detect complex patterns and incidents.
Reference: FortiSIEM 6.3 User Guide, Advanced Analytics Rules Engine section, which explains the use of different operations to reference subpatterns in rules.
Jessenia
2 months agoChau
17 days agoDortha
18 days agoHildegarde
1 months agoTarra
2 months agoDortha
4 days agoArthur
8 days agoMicaela
23 days agoLashawn
2 months agoCecil
1 months agoAleisha
1 months agoKenneth
2 months agoYen
2 months agoShenika
17 days agoPansy
22 days agoRhea
1 months agoJani
1 months agoGarry
2 months agoStephaine
2 months agoDorethea
2 months ago