What is a prerequisite for a FortiSIEM supervisor with a worker deployment, using the proprietary flat file database?
Correct Answer:
B
Which item is required to register a FortiSIEM appliance license?
Correct Answer:
D
Which protocol is almost always required for the FortiSIEM GUI discovery process?
Correct Answer:
A
A FortiSIEM administrator wants to restrict a network administrator to running searches for only firewall devices. Under role management, which option does the FortiSIEM administrator need to configure to achieve this scenario?
Correct Answer:
B
An administrator is using SNMP and WMI credentials to discover a Windows device. How will the WMI method handle this?
Correct Answer:
D
Explanation
WMI Method: Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a network.
Log Collection: WMI is used to collect various types of logs from Windows devices.
Security Logs: Contains records of security-related events such as login attempts and resource access.
Application Logs: Contains logs generated by applications running on the system.
System Logs: Contains logs related to the operating system and its components.
Comprehensive Data Collection: By using WMI, FortiSIEM can gather a wide range of event logs that are crucial for monitoring and analyzing the security and performance of Windows devices.
References: FortiSIEM 6.3 User Guide, Data Collection Methods section, which details the use of WMI for collecting event logs from Windows devices.