FortiGate Administrator Login from Multiple IP Addresses
editFortiGate Administrator Login from Multiple IP Addresses
editThis rule detects successful logins to the FortiGate management interface using the same Administrator account from multiple distinct source IP addresses within an 24-hour period. Administrator logins from multiple locations in a short time window may indicate credential sharing, compromised credentials, or unauthorized access and should be investigated.
Rule type: esql
Rule indices: None
Severity: high
Risk score: 73
Runs every: 5m
Searches indices from: now-24h (Date Math format, see also Additional look-back time)
Maximum alerts per execution: 100
References:
Tags:
- Use Case: Threat Detection
- Tactic: Initial Access
- Resources: Investigation Guide
- Domain: Network
- Domain: Identity
- Data Source: Fortinet
Version: 1
Rule authors:
- Elastic
Rule license: Elastic License v2
Investigation guide
edit## Triage and Analysis
Investigating FortiGate Administrator Login from Multiple IP Addresses
This alert indicates that the same Administrator account successfully logged in to the FortiGate management interface from multiple distinct source IP addresses within an 24-hour period.
Because FortiGate administrator credentials grant full control over network security infrastructure, this behavior may indicate credential compromise, account sharing, or misuse of administrative access.
Investigation Steps
- Review the affected account
-
Identify the administrator account in
source.user.name. - Confirm whether the account is shared, personal, or service-related.
- Validate whether concurrent or near-concurrent access is expected.
- Analyze source IP addresses
-
Review the list of
source.ipvalues associated with the logins. - Determine whether the IPs belong to trusted management networks, VPN pools, or jump hosts.
-
Investigate geolocation differences using
source.geo.country_name. - Assess timing and session behavior
- Check whether logins occurred close together in time or overlapped.
- Identify whether access patterns suggest session hopping or credential reuse.
- Review post-authentication activity
- Examine FortiGate logs for configuration changes, policy updates, or administrative actions following the logins.
- Look for additional authentication attempts (successful or failed) from the same IPs or user.
- Correlate with environment context
- Verify maintenance windows, incident response activity, or operational tasks that could explain the behavior.
- Confirm whether administrators commonly access FortiGate via multiple networks or devices.
False Positive Considerations
- Administrators connecting through VPNs with dynamic or rotating IP addresses.
- Access via bastion hosts, load-balanced management interfaces, or cloud-based management tools.
- Automation or orchestration systems using shared administrator credentials.
- Incident response or troubleshooting activity involving multiple access points.
Response and Remediation
- If the activity is expected
- Document the behavior and consider tuning the rule or adding exceptions for known IP ranges or accounts.
- Encourage use of named accounts and centralized access paths.
- If the activity is suspicious
- Reset or rotate credentials for the affected administrator account.
- Review FortiGate configuration changes made during the session(s).
- Restrict administrative access to trusted IP ranges.
- Enforce MFA for administrative logins if not already enabled.
- Monitor for additional signs of lateral movement or persistence.
Rule query
editFROM logs-fortinet_fortigate.*, filebeat-* metadata _id
| WHERE event.dataset == "fortinet_fortigate.log" and
event.category == "authentication" and event.action == "login" and
event.outcome == "success" and source.user.roles == "Administrator" and
source.user.name is not null and source.ip is not null
| stats Esql.logon_count = count(*),
Esql.source_ip_count_distinct = COUNT_DISTINCT(source.ip),
Esql.max_timestamp = MAX(@timestamp),
Esql.source_ip_values = VALUES(source.ip),
Esql.message_values = VALUES(message),
Esql.source_geo_country_name_values = VALUES(source.geo.country_name) by source.user.name
// last logon event timestamp is within 6m of the rule execution time to avoid duplicates
| eval Esql.recent = DATE_DIFF("minute", Esql.max_timestamp, now())
| where Esql.recent <= 6 and Esql.logon_count >= 2 and Esql.source_ip_count_distinct >= 2
// move dynamic fields to ECS equivalent for rule exceptions
| eval source.ip = MV_FIRST(Esql.source_ip_values)
| keep source.ip, source.user.name, Esql.*
Framework: MITRE ATT&CKTM
-
Tactic:
- Name: Initial Access
- ID: TA0001
- Reference URL: https://attack.mitre.org/tactics/TA0001/
-
Technique:
- Name: Valid Accounts
- ID: T1078
- Reference URL: https://attack.mitre.org/techniques/T1078/