This section covers two powerful features in FortiSIEM: Baselines and UEBA (User and Entity Behavior Analytics). These tools help detect security incidents by analyzing normal behavior patterns and flagging deviations.
Identify Deviations:
Detect Advanced Persistent Threats (APTs):
Collect Data:
Establish the Baseline:
Continuously Update:
Define Thresholds:
Behavioral Pattern Learning:
Anomaly Detection:
Risk Scoring:
Enable UEBA Features:
Define Thresholds:
Adjust Models Dynamically:
Think of baselines and UEBA like tracking someone’s daily routine:
Baseline:
You notice your friend always leaves for work at 8 AM, stops for coffee at 8:15, and arrives at the office by 9 AM. If one day they’re at the coffee shop at 3 AM, you’d think, “That’s unusual.”
UEBA:
If your friend also starts visiting an unknown place after the coffee shop and their phone sends messages to unknown numbers, UEBA assigns a risk score and flags this behavior as suspicious.
Baseline:
UEBA:
Steps to Success:
Prioritization of Threats
Reducing Alert Fatigue with Baselines
Fine-Tuning Incident Response Strategies
Automated Threat Hunting
What is the purpose of baseline rules in FortiSIEM?
Baseline rules detect anomalies by comparing current activity against historical behavior patterns.
Baseline rules allow FortiSIEM to identify abnormal activity rather than relying only on fixed thresholds. The system learns normal behavior over time by analyzing historical event data. For example, a user may normally log in during business hours from a specific location. If the same user suddenly logs in from another country at midnight, the baseline model recognizes this deviation and triggers an alert. This approach is effective for detecting insider threats, compromised accounts, or unusual system behavior. A common mistake is expecting baseline rules to trigger immediately after creation. Because they rely on historical analysis, the system requires sufficient historical data to establish normal patterns.
Demand Score: 87
Exam Relevance Score: 88
How does FortiSIEM build a behavioral baseline for UEBA analysis?
FortiSIEM analyzes historical event data to determine typical activity patterns for users, devices, and network behavior.
User and Entity Behavior Analytics (UEBA) relies on historical data to model what normal behavior looks like for users or systems. The system analyzes metrics such as login frequency, geographic location, accessed resources, and network traffic patterns. These behaviors are stored as statistical baselines. When new events occur, FortiSIEM compares them against these patterns to determine whether they are normal or anomalous. For example, if a user suddenly accesses sensitive systems they never accessed before, UEBA may flag this behavior. The accuracy of UEBA improves as more historical data becomes available.
Demand Score: 86
Exam Relevance Score: 87
What is the difference between baseline rules and threshold-based rules in FortiSIEM?
Baseline rules detect deviations from historical patterns, while threshold-based rules trigger alerts when predefined limits are exceeded.
Threshold-based rules rely on static values defined by administrators. For example, a rule might trigger if more than five failed login attempts occur within one minute. Baseline rules, on the other hand, analyze historical activity and dynamically determine what constitutes abnormal behavior. For instance, if a user normally generates two logins per day but suddenly generates twenty, a baseline rule may detect this anomaly even though no fixed threshold was configured. Baseline detection is useful for identifying subtle attacks that do not exceed static thresholds but still represent unusual behavior.
Demand Score: 83
Exam Relevance Score: 86
Why might a baseline rule generate false positives in FortiSIEM?
False positives may occur if the baseline model is built from insufficient or abnormal historical data.
Baseline detection depends heavily on the quality of historical data. If the baseline is trained during periods of abnormal activity, such as during testing, system migrations, or incident response, the system may learn incorrect behavior patterns. This can cause legitimate activity to appear anomalous or malicious behavior to be treated as normal. Another common cause is insufficient historical data, especially in newly deployed environments. Administrators should allow adequate learning periods and periodically review baseline behavior models to ensure they reflect normal operations.
Demand Score: 82
Exam Relevance Score: 84
What types of security threats can UEBA detect that traditional correlation rules may miss?
UEBA can detect insider threats, compromised accounts, and subtle behavioral anomalies.
Traditional correlation rules detect predefined patterns such as known attack sequences or signature-based events. However, many modern attacks involve legitimate credentials and subtle behavior changes that may not trigger rule thresholds. UEBA analyzes behavioral patterns over time and can detect deviations such as unusual login locations, abnormal access to sensitive data, or atypical network usage. For example, if a privileged user suddenly accesses dozens of systems they have never accessed before, UEBA may flag this behavior even though no explicit rule exists for that scenario. This makes UEBA valuable for detecting advanced threats and insider activity.
Demand Score: 84
Exam Relevance Score: 87