Task 1 - Quarantine Client
As a first Task in this lab, you will develop your own Playbook to quarantine Client on FortiClient EMS. Based on the Informaition you have learned in the Prvious Chapter, the Playbook has to accomplish the following tasks:
The Information of the Client need to be extracted based on a Security Event / Alert retrived from FortiAnalyzer/FortiWeb
- To trigger an Attack alert, make sure that a Security profile is configured within the FortiWeb Policy, in addition, feel free to use the following string and just append it to the URL to trigger an Attack Alert
?q=%27%20or%20data%20@>%20%27{"a":"b"}%27%20--
Retrieve more details based on the Alert Information about the Client
Provide Approval Wizard before Quarantine Client with the following Information
- FortiClient EMS ID
- Client IP
- Reason to Quarantine
- OS Version
- FortiClient Version
Quarantine Client on FortiClient EMS
Don’t forget to think about the case, that the Approval get’s rejected.
Hint
In case you will use the Get all Endpoints
function of the FortiClient EMS Connector, the following Values are required:
- Value for Field:
Verifiction
:
{
"saml_id": "",
"ldap_ids": []
}
- Value for Field:
Filter
:
<Specify you filter here - have a look into the example playbook>