Skip to main content

Cyware Orchestrate

Fortinet FortiEDR 2.0.0

App Vendor: Fortinet

App Category: Endpoint, Forensics & Malware Analysis

Connector Version: 2.0.0

API Version: 1.0.0

About App

Fortinet FortiEDR protects endpoints before and after infection, stops data breaches in real time, and automatically orchestrates incident investigation and response. In Orchestrate, the app enables security teams to isolate and unisolate endpoints. The app also helps in retrieving files, collectors, events, products, raw event items, system summaries, and hash values.

The Fortinet FortiEDR app is configured with the Orchestrate application to perform the following actions.

Action Name

Description

Get File

This action retrieves a binary file in zip format.

Isolate Endpoint

This action isolates an endpoint.

List Collectors

This action retrieves a list of collectors in the system.

List Events

This action retrieves a list of events in the system.

List Products

This action retrieves a list of communicating applications in the system.

List Raw Event Items

This action retrieves a list of raw data items of an event.

List System Summary

This action retrieves the system summary data of the environment.

Search Hash

This action searches for a file hash among the current events, threat hunting repository, and communicating applications that exist in the system.

Unisolate Endpoint

This action unisolates an endpoint.

Configuration Parameters

The following configuration parameters are required for the Fortinet FortiEDR connector app to communicate with the Fortinet FortiEDR enterprise application. The parameters can be configured by creating instances in the app.

Parameter

Description

Field Type

Required/Optional

Comments

Base URL

Enter the base URL.

Example:

"www.cyware.com"

Text

Required

Auth Token

Enter the authentication token.

Password

Required

Verify

Specify whether you want to verify the TLS certificate or not.

Example:

true

Boolean

Optional

Allowed values:

  • true

  • false

Default value:

true

Action: Get File

This action retrieves a binary file in zip format.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

File Paths

Enter the list of file paths.

List

Required

 

Type

Enter the input type of the Device input parameter.

Text

Required

Allowed values:

  • name

  • id

Device

Enter the name or ID of the device to remediate.

Text

Required

 

Query Params

Enter the query parameters.

Key Value

Optional

 

Action: Isolate Endpoint

This action isolates an endpoint.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Device ID

Enter the list of IDs of the devices to isolate. 

Example:

$LIST[1001, 10002]

List

Required

 

Devices

Enter the list of device names. 

Example: 

$LIST[device1, device2]

List

Required

 

Organization

Enter the name of the organization.

Example:

"Cyware"

Text

Required

 

Action: List Collectors

This action retrieves a list of collectors in the system.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query Params

Enter the query parameters.

Key Value

Optional

Allowed keys:

  • device

  • collectorGroups

  • operatingSystems

  • macAddresses

  • fileHash

For the complete list of allowed keys, see Fortinet Endpoint Protection and Response Platform RESTful API.

Action: List Events

This action retrieves a list of events in the system.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Event IDs

Enter a comma-separated list of event IDs.

Text

Optional

 

Query Params

Enter the query parameters.

Key Value

Optional

Allowed keys:

  • device

  • collectorGroups

  • operatingSystems

  • macAddresses

  • fileHash

For the complete list of allowed keys, see Fortinet Endpoint Protection and Response Platform RESTful API.

Action: List Products

This action retrieves a list of communicating applications in the system.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query Params

Enter the query parameters.

Key Value

Optional

Allowed keys:

  • vendors

  • products

  • versions

  • vendor

  • processes

  • ips

For the complete list of allowed keys, see Fortinet Endpoint Protection and Response Platform RESTful API.

Action: List Raw Event Items

This action retrieves a list of raw data items of an event.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Event ID

Enter the event ID.

Text

Required

 

Query Params

Enter the query parameters.

Key Value

Optional

Allowed keys:

  • device

  • collectorGroups

  • operatingSystems

  • macAddresses

  • fileHash

For the complete list of allowed keys, see Fortinet Endpoint Protection and Response Platform RESTful API.

Action: List System Summary

This action retrieves the system summary data of the environment.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Query Params

Enter the query parameters.

Key Value

Optional

Allowed keys:

  • organization

  • addLicenseBlob

Action: Search Hash

This action searches for a file hash among the current events, threat hunting repository, and communicating applications that exist in the system.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Hash

Enter a comma-separated list of hash values.

Text

Required

 

Action: Unisolate Endpoint

This action unisolates an endpoint.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Device ID

Enter a comma-separated list of device IDs.

Example:

$LIST[1001, 10002]

List

Required

Devices

Enter a comma-separated list of device names. Example:

$LIST[device1, device2]

List

Required

Organization

Enter the organization name.

Example:

"Cyware"

Text

Required