Collecting Information

Port Information

Port 1

IP:

____.____.____.____

 

Netmask:

____.____.____.____

Port 2

IP:

____.____.____.____

 

Netmask:

____.____.____.____

Port 3

IP:

____.____.____.____

 

Netmask:

____.____.____.____

Port 4

IP:

____.____.____.____

 

Netmask:

____.____.____.____

The internal interface IP address and netmask must be valid for the internal network.

General settings

Administrator password:

 

 

 

 

 

Network Settings:

Default Gateway:

____.____.____.____

 

Primary DNS Server:

____.____.____.____

 

Secondary DNS Server:

____.____.____.____

Factory default settings

NAT/Route mode

 

Transparent mode

 

Port 1 interface

192.168.1.99

Management IP

0.0.0.0

Port 2 interface

0.0.0.0

Administrative account settings

Port 3 interface

0.0.0.0

User name

admin

Port 4 interface

0.0.0.0

Password

fortidb1!$

To reset the FortiDB unit to the factory defaults, in the CLI type the command execute reset all-settings

Configuring

Use the following CLI commands to configure the FortiDB unit for the network. For details on using the CLI, see the CLI Reference.

Configuring the IP address and netmask

config system interface edit port1

set ip <intf_ip><netmask>

end

Configure the default gateway

config system route edit 1

set device <port_number>

set dst <ip_address><netmask> set gateway <gateway_ip>

end

VA QuickStart Guide

This guide leads you through the process that results in the creation of a vulnerability assessment report for one of your target databases. The example below assumes you will be assessing an Oracle target database. Before starting assessment, you will need to make sure that the FortiDB user for your Oracle target database has the following privileges:

CREATE SESSION

SELECT_CATALOG_ROLE

SELECT SYS.AUDIT$

SELECT SYS.REGISTRY$HISTORY

SELECT SYS.USER$

SELECT SYS.LINK$

SELECT SYSTEM.SQLPLUS_PRODUCT_PROFILE

1.Login to FortiDB as the FortiDB default admin user (admin) using fortidb1!$ for the password .

2.Create a target-database connection.

a.Select Targets link under Target Management.

b.Select Add and select the General tab.

c.Enter the information in the text boxes marked with an asterisk (*) with settings appropriate to your target database. Assume an Oracle target with these parameters:

Name: vatarget

Type: Oracle

Port: 1521

Host Name: (IP address or machine name on your system that contains the Oracle target database.)

User Name: (Name of the FortiDB user for your Oracle target database)

Password: (Password of the FortiDB user for your Oracle target database)

d.Select the Test Connection to verify your target database is reachable and that your connection parameters are correct. You should see a ‘Success’ message.

e.Select Save. vatarget appears on the Targets page under the Name column header.

3.Run assessment against your target database.

a.Go to Assessments under Assessments Management.

b.Select the check box to the left of Scan All Oracle Databases which your target database belongs to.

c.Select Run. After a minute or so, you should see the Last Run Time column in the Scan All Oracle Database row get populated with a stop date and time for the assessment you just ran.

Note: If you want to create your own target group, policy group, or assessment, please refer to online help for detailed instructions.

Generating a Report

We will examine our assessment with the Summary Failed Report which summarizes failed-policy results.

1.Go to Pre-Defined Report under Report Management.

2.Select Summary Failed Report.

3.On the Vulnerability Assessment Summary Failed Report page, select:

Scan All Oracle Databases from the Assessment Name dropdown list

The start date and time associated with Scan All Oracle Databases from the Assessment Time dropdown list.

Target name, which is vatarget in this example, from the Target dropdown list.

4.Select the Preview Report tab and, after it is compiled, a Summary Failed Report will appear in your browser.

5.To view your report in another of the supported formats, scroll down to the Export as drop down list, select the file format you want, and click the Export button. The following file formats are supported:

PDF

Excel

Tab-delimited

Comma-separated values

FortiDB MA Quick Start

This section leads you through the process that results in the creation of a Monitoring and Auditing report for one of your target databases. The example below assumes monitoring of an Oracle target database and generating alerts using User Behavior Monitor, and creating reports using Alert Report Manager. If you want to set to audit_trail=OS, you need to run FortiDB Audit log agent. For details, see the Administration Guide.

Note: To display FortiDB MA Web user interface, you need to use Internet Explorer 7.

To allow FortiDB MA to assess or monitor Oracle databases, create an Oracle user with the following privileges. For other modules, see the Administration Guide.

CREATE SESSION

SELECT_CATALOG_ROLE

DELETE_CATALOG_ROLE

AUDIT ANY

AUDIT SYSTEM

SELECT SYS.AUD$

SELECT on the monitored tables or SELECT ANY TABLE

1.Login to FortiDB MA as admin using fortidb1!$ for the password.

2.Create a FortiDB MA user who has User Behavior Monitor User Role and Report Manager User Role.

a.In the left-side navigation tree, click on User Administration.

b.Select Add New User link at the bottom.

c.On the Add New User page, enter the following information.

User Name

Password

Password Again

First Name and Last Name

Email Address

d.On the Status field, check Active to activate a new user you will create.

3.On the Software Module section, check the User role of User Behavior Monitor and Alert Report Manager.

a.Click the Save button.

b.Click the Logout link at the top-right of the screen in order to logout as the admin user.

4.Log in as the newly created user, and create a target-database connection.

a.In the left-side navigation tree, click on the User Behavior Monitor link.

b.Click Database > New from the top menu

c.On the Create New Database Connection page, enter Oracle target database information:

Database Connection Name: specify any name (ex. ora123)

Database Server Name, IP address, and port number: enter <IP address>:1521 (ex. 172.30.62.11:1521)

Database Server type : select Oracle from the pull-down list

Database Name: enter your target database name (ex. Ora123)

User Name: enter your target database user name (ex. testuser1)

Password: enter your target database password (ex. fortinet123)

d.Click the Create button.

e.To open the connection, go to Database > Open. Highlight the target database, ora123, and click the Open and Run button. The connection icon becomes the open status icon (green) in the left-side navigation tree.

5.To create an Object Policy, click Set Policies > Object Policies. In this example, we monitor security violation and suspicious OS user for SCOTT.BONUS table.

a.In the Object Policies Configuration page, click the Add Item link at the bottom.

b.In the Item Settings tab, click S in the Show Schema field, and select SCOTT from the schema pull-down list.

c.Click ALL in the Show Table field, and select BONUS from the table list.

d.For Audit-action type, check both SELECT and INSERT/UPDATE/DELETE.

e.In the Access Violation Settings tab, check the Active box of “Security Violation” and “Suspicous OS User”.

f.Check the Enable this guard item box.

g.Click the Save button.

6.To create a schedule, click Set Defaults > Module Guard Schedule on the top menu.

For example, enter 1 in Minutes field of Interfal section to retrieve data every 1 minute.

7.Click the Set Timer button.

8.Login to your target database and execute SQL statements to generate alerts.

For this example, login as SCOTT and select a table BONUS or insert/update/delete some data.

9.Go to Analysis > Alerts Messages to check alerts

Generating a Report

We will generate reports based on alerts created by User Behavior Monitor.

The example below assumes that you will generate a one time only report in PDF format.

1.In the left-side navigation tree, click on the Report Manager.

2.Click New Reports under Alert Report Manager. Specify the following fields.

Report Name (required): enter “My Report 1” for example.

Module: check User Behavior Monitor check box.

Database: select ora123.

For other fields, leave as default.

3.In the Report Generate Schedule section, check the One Time Only check box.

4.In the Report Format section, check the Show Column of Description (the default is unchecked).

5.Check Enable Report check box.

6.Click the Save button. The Current Reports page will display.

7.Click Summary in the Action column of My Report 1.

8.Click the PDF button to save the report in PDF format. You can save your report in these formats:

PDF

Excel

Tab Delimited

Comma Delimited

Page 2
Image 2
Fortinet FortiDB-2000B Collecting Information, Configuring, Port Information, General settings, Factory default settings

FortiDB-2000B specifications

Fortinet FortiDB-2000B is a robust database security platform that provides comprehensive protection for enterprise database environments. With the increasing instances of database breaches and data theft, organizations need to prioritize database security to safeguard sensitive information. FortiDB-2000B stands out in the market due to its advanced capabilities, scalability, and ease of integration.

One of the main features of FortiDB-2000B is its real-time monitoring capabilities. The solution continuously analyzes database activity, identifying and alerting administrators to any unusual or suspicious behavior. This proactive monitoring helps in quickly detecting potential threats, allowing organizations to respond swiftly and mitigate risks.

Another highlight of FortiDB-2000B is its vulnerability scanning and assessment tools. The platform regularly scans databases for known vulnerabilities, misconfigurations, and compliance issues. This feature enables organizations to address security weaknesses before they can be exploited by attackers, promoting a stronger overall security posture.

FortiDB-2000B leverages advanced technologies such as machine learning and behavioral analytics to enhance threat detection. By analysing user behavior and database access patterns, it can identify potential insider threats and unauthorized access attempts. This intelligence-driven approach significantly reduces false positives and elevates the accuracy of security alerts.

In terms of compliance, FortiDB-2000B assists organizations in adhering to regulations such as GDPR, PCI DSS, and HIPAA. The solution provides audit logs and reporting features that facilitate compliance management, making it easier for organizations to demonstrate their commitment to data security and regulatory requirements.

Scalability is another critical characteristic of FortiDB-2000B. Designed to handle the demands of large enterprise environments, it can manage multiple databases across various platforms, including cloud, on-premises, and hybrid environments. This flexibility ensures that organizations can efficiently scale their database security operations as they grow.

FortiDB-2000B also boasts seamless integration with other Fortinet security products, allowing for a unified security strategy. Organizations can benefit from a centralized management console, providing visibility and control over their entire security infrastructure.

In summary, Fortinet FortiDB-2000B is an essential solution for any organization looking to secure their databases. With its real-time monitoring, vulnerability scanning, machine learning capabilities, compliance support, and scalability, it offers a comprehensive approach to database security, safeguarding critical data against ever-evolving threats.