FortiSIEM – Ultra Detailed Installation
Guide with Explanations
1. Step 1: Download the latest FortiSIEM OVA or ISO file from Fortinet support portal.
→ You must be a registered Fortinet partner/customer to download the image.
2. Step 2: Deploy FortiSIEM virtual appliance on supported platforms (VMware ESXi, KVM,
Hyper-V).
→ Virtual platforms allow flexible deployments for multi-tier environments.
3. Step 3: Allocate resources based on deployment size (minimum 8 vCPU, 32GB RAM,
500GB disk).
→ Proper resource allocation ensures performance for parsing and analytics.
4. Step 4: Power on the virtual machine and log in to the CLI with default credentials
(root / password).
→ CLI login is required for the first-time setup.
5. Step 5: Run the initial configuration script to set hostname, IP address, subnet, gateway,
and DNS.
→ Initial configuration enables the appliance to communicate over the network.
6. Step 6: Create passwords for the supervisor, postgres, and other core users when
prompted.
→ Securing internal user accounts prevents unauthorized access.
7. Step 7: Once IP is set, open browser and navigate to https://<FortiSIEM-IP>:8000.
→ GUI access is needed for complete configuration and daily operations.
8. Step 8: Log in using 'super' user and the configured password.
→ ‘super’ user has full access to all FortiSIEM features.
9. Step 9: Accept license agreement and upload license key from Fortinet.
→ License activates full functionality and scalability options.
10. Step 10: Under 'Admin > License', verify that the license is active and valid.
→ License status confirms your instance is ready for production use.
11. Step 11: Configure NTP server and time zone for log correlation accuracy.
→ Time synchronization is critical for accurate event timelines.
12. Step 12: Under 'Admin > Settings > Network', configure email server and syslog settings.
→ Email and syslog settings allow alerting and external logging.
13. Step 13: Under 'Admin > Discovery', define IP ranges and SNMP/SSH credentials for
asset discovery.
→ Discovery setup identifies network devices for monitoring.
14. Step 14: Use 'CMDB > All Devices' to confirm discovered devices are visible.
→ CMDB maintains an inventory of discovered assets.
15. Step 15: Under 'Rules', enable built-in correlation rules or create custom rules.
→ Rules define what triggers alerts and incidents.
16. Step 16: Under 'Incidents', monitor triggered security events and assign to analysts.
→ Incident dashboard helps prioritize SOC analyst response.
17. Step 17: Set up users and RBAC roles under 'Admin > User Management'.
→ User roles segment responsibilities in large teams.
18. Step 18: Enable log collection via syslog or agent-based ingestion from firewalls,
endpoints, etc.
→ FortiSIEM collects logs from a wide range of IT/security systems.
19. Step 19: Create dashboards and reports to visualize log data and threat posture.
→ Dashboards help with situational awareness and compliance reporting.
20. Step 20: Schedule configuration backup and set alert thresholds for system
performance.
→ Backups protect against config loss and enable disaster recovery.