Hello community. I am having big issue right now.
I have Integrated Fortigate and Elastic. Then attempted to integrate MISP to Elastic. Integration was well till [Logs MISP] Dashboard was thinking Total Indicators count is actually fortigate logs.( screenshot 1)
When I click to “explore in discover”, it redirected me to Fortigate logs (screenshot 2)
My main mission is match the fortigate destination Ips with MISP’s feed database.
I think what you’re seeing is probably caused by the MISP dashboard querying the wrong data view, not because FortiGate logs are actually becoming MISP indicators.
What I think is happening
The [Logs MISP] dashboard is built to work only with MISP indicator documents.
In your case, the dashboard’s data view/index pattern probably includes FortiGate indices (for example something like logs-*).
Because of that:
The “Total Indicators” visualization is counting FortiGate log events.
Clicking “Explore in Discover” correctly opens Discover, but shows FortiGate logs, since those are part of the same data view.
So I don’t really think that the dashboard is broken — it’s probably just not filtered to MISP data only.
What to check first
Data View used by the MISP dashboard
Go to Stack Management → Data Views
Find the data view used by the MISP dashboard
Make sure it only includes MISP indices/data streams, for example:
logs-ti_misp.*
Avoid broad patterns like:
logs-*
Event filtering
MISP documents should have fields like:
event.module: ti_misp
threat.indicator.*
FortiGate logs usually have:
event.module: fortinet
The dashboard visualizations should filter on the MISP module/dataset.
About matching FortiGate IPs with MISP indicators
Elastic does not automatically match FortiGate destination IPs with MISP feeds just by ingesting both.
To achieve that, you need one of the following:
Indicator Match detection rule
(Security → Rules → Indicator Match)
Match destination.ip from FortiGate logs
Against threat.indicator.ip from MISP
or
Threat Intel enrichment / enrich policy
Enrich FortiGate events at ingest time using MISP indicators
Until one of these is configured, FortiGate logs and MISP indicators will remain separate datasets.
Summary
The MISP dashboard is likely counting FortiGate logs because of a shared data view
Its possible to fix the index pattern / filters so it only targets MISP data
Use Indicator Match rules or enrichment to correlate FortiGate IPs with MISP
The dashboard is a Managed Dashboard, it is built by Elastic and it is part of the MISP integration, the user has no control over it and cannot edit the visualizations.
So, if a visualization on the MISP dashboard may not show MISP events because it is missing a filter, than I think that the dashboard is broken, it needs to be fixed by Elastic as it is part of an integration.
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.