Setting up Azure Sentinel Connector for FortiAnalyzer(FAZ)
- Vichitra Mohan
- 5 days ago
- 2 min read

Architecture Overview
The integration uses a dedicated Linux machine as a proxy server. The data flows as follows:
FortiAnalyzer sends Syslog messages to the Linux machine via TCP/UDP port 514.
A Syslog Daemon (rsyslog or syslog-ng) on the Linux machine listens for these messages and forwards them to the AMA on TCP port 28330.
The Azure Monitor Agent (AMA) parses the data and transmits it to the Microsoft Sentinel Log Analytics workspace over HTTPS 443.
A Data Collection Rule (DCR) governs the process by defining the source Linux VM and the destination Syslog table.
Deployment Steps
1. Microsoft Sentinel Configuration
Install the Connector: In Microsoft Sentinel, go to Content hub, search for Syslog, and install the solution. This enables the Syslog via AMA data connector.
Establish a DCR: Create a Data Collection Rule in the same region as your workspace.
Resources: Select your dedicated Linux VM.
Collect: Add the LOG_LOCAL7 facility and set the minimum log level (e.g., LOG_NOTICE).
2. Linux Log Forwarder Setup
On your dedicated Linux VM, execute the following command to install and configure the log collector script provided by Microsoft:
sudo wget -O Forwarder_AMA_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/Syslog/Forwarder_AMA_installer.py && sudo python Forwarder_AMA_installer.py
3. FortiAnalyzer Configuration
Configure the FortiAnalyzer CLI to forward logs to the Linux VM's IP address using the following parameters:
Bash
config system log-forward
edit 1
set mode forwarding
set fwd-max-delay realtime
set server-name "linux syslog"
set server-addr "<Linux_VM_IP>"
set fwd-server-type syslog
set fwd-reliable enable
set fwd-facility local7
next
end
Validation and Troubleshooting
Verify FortiAnalyzer Forwarding:
Use the command `diagnose test application logfwd 4` to check the status of the forwarding service.
Check Linux Services: - Restart the daemon using `sudo systemctl restart rsyslog`.Confirm the daemon is listening on the correct ports with `netstat -lnptv`.
Traffic Capture: - Run `tcpdump -i any port 514 -A -vv` to see live packets arriving from the FortiAnalyzer.
Sentinel Troubleshooting Script: - Run the automated tool to verify the entire connector chain:
`sudo wget -O Sentinel_AMA_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/Syslog/Sentinel_AMA_troubleshoot.py && sudo python3 Sentinel_AMA_troubleshoot.py --SYSLOG`
Monitor Metrics: - In the Azure Portal, view the DCR's Metrics section and set it to Log Ingestion per Minute to confirm active data flow.




Comments