Comprehensive and Detailed Explanation From FortiOS 7.6, FortiWeb 7.4 Exact Extract study guide:
Based on theFortiCNP 22.4/24.4 Administration Guideand theFortinet Cloud Security Study Guide, findings in FortiCNP are categorized by the specific policy type that triggered the alert.
Threat Detection Policy (Option B):This policy category is designed to monitor and alert on anomalousUser ActivityandNetworkthreats. Specifically, "Suspicious Location" is a predefined threat detection rule that triggers when a user performs an action (such as aDownload Fileas seen in the exhibit) from a geographic location or IP address that is not on the organization's allow list or deviates from established behavioral baselines. The exhibit explicitly shows the "Activity Type" as "Download File" and the "Policy Name" as "Suspicious Location," both of which fall under theThreat Detection > User Activitypolicy tab.
Policy Hierarchy and Finding Types:
Threat Detection:Includes User Activity (Suspicious Location, Suspicious Time, Suspicious Movement) and Network findings.
Data Scan Policy (Option A):These policies are used for content-level inspection, such as searching for Malware or Data Loss Prevention (DLP) patterns like credit card numbers within files.
Risk Management Policy (Option C):These policies focus on Cloud Security Posture Management (CSPM), alerting on misconfigurations such as unencrypted buckets or disabled logging (e.g., CloudTrail).
File Collection (Option D):While "File Collection" is a configuration object used to define a group of files for monitoring, it is not thepolicy typethat generates a behavioral alert like "Suspicious Location".
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit