We are pleased to announce that on Tuesday February 24, Adlumin will release a new set of detection rules for Fortinet. This update expands your visibility into threats in Fortinet-protected environments by analyzing the Fortinet syslog data you already send to Adlumin. In practical terms, these new detections help identify a wider range of malicious activities including, wireless network attacks, misused or high-risk applications, and unusual data exfiltration attempts using the Fortinet log information currently forwarding to our platform.
These detection rules are part of Adlumin’ s existing Fortinet firewall integration and are automatically enabled on our side. No additional configuration or separate enablement is required within the Adlumin platform. If your Fortinet devices are already forwarding syslog to Adlumin, the new detections will begin evaluating incoming logs as soon as they are released.
If you have not yet configured your Fortinet appliances to forward logs to Adlumin, standard syslog forwarding must be enabled in order to take advantage of these detection enhancements. Once active, alerts generated by these rules appear alongside your other Adlumin detections within the platform. They are surfaced through the same detection and alerting views you already use today, rather than in a separate or dedicated firewall‑only section. Fortinet is identified as the log source within the detection details to provide relevant context.
Please note that some detections rely on specific Fortinet services and features to generate the required logs and context. For full details, including a list of the new detection rules and any Fortinet feature dependencies, please refer to the Adlumin Release Notes.