0% found this document useful (0 votes)
28 views2 pages

FortiRecon Ultra Detailed Installation Explained

The FortiRecon installation guide outlines a step-by-step process for setting up the cloud-based digital risk protection service. Key steps include provisioning an account, configuring organizational settings, and establishing monitoring alerts for various threats. The guide emphasizes continuous adaptation to the threat landscape through analytics and regular reviews with security teams.

Uploaded by

ysridat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views2 pages

FortiRecon Ultra Detailed Installation Explained

The FortiRecon installation guide outlines a step-by-step process for setting up the cloud-based digital risk protection service. Key steps include provisioning an account, configuring organizational settings, and establishing monitoring alerts for various threats. The guide emphasizes continuous adaptation to the threat landscape through analytics and regular reviews with security teams.

Uploaded by

ysridat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

FortiRecon – Ultra Detailed Installation

Guide with Explanations


1. Step 1: FortiRecon is a SaaS-delivered service. Go to
https://www.fortinet.com/products/digital-risk-protection/fortirecon and click
'Request Demo' or 'Login'.

→ FortiRecon does not require on-prem installation; it's fully cloud-based.

2. Step 2: Fortinet team will provision your tenant and share login credentials via email.

→ A provisioned account is necessary to access your tenant environment.

3. Step 3: Log in to the FortiRecon portal at https://fortirecon.fortinet.com.

→ Access the centralized dashboard and tools from your secure tenant URL.

4. Step 4: Upon first login, configure your organization’s name, sectors, and geolocation.

→ These initial settings help FortiRecon tailor monitoring to your industry and risk
profile.

5. Step 5: Go to 'Digital Footprint' and add your domain, IP ranges, subdomains, and assets.

→ Digital Footprint setup identifies assets and exposure externally visible to attackers.

6. Step 6: Under 'Threat Intelligence', select your threat priorities (e.g., brand abuse,
impersonation, credential leaks).

→ You prioritize what FortiRecon should alert on from its global intel feed.

7. Step 7: Configure monitoring alerts and notification channels (email, webhook, SIEM
integration).

→ Custom alerting helps SOC teams respond faster to actual threats.

8. Step 8: Enable shadow IT discovery and SaaS exposure mapping.

→ Shadow IT discovery tracks unauthorized cloud or SaaS use by employees.

9. Step 9: Define incident severity levels under Settings > Incident Response.

→ Categorizing incidents improves escalation paths and response timelines.

10. Step 10: Set up user roles under Administration > User Management.

→ RBAC is enforced by assigning roles for visibility, triage, and control.


11. Step 11: Schedule PDF or CSV reports for brand risk and external attack surface.

→ Scheduled reports ensure management and compliance visibility.

12. Step 12: Monitor for phishing kits and fake domains under Brand Monitoring.

→ FortiRecon watches for phishing attempts and domain hijacking.

13. Step 13: Enable alert triaging and response recommendations in the dashboard.

→ Automated recommendations improve response efficiency.

14. Step 14: Integrate with FortiSIEM or 3rd party SIEM via API token from Integration
Settings.

→ API integration allows correlation with existing security platforms.

15. Step 15: Use takedown request tools to initiate response for malicious domains or social
profiles.

→ Takedown tools automate legal and technical mitigation of threats.

16. Step 16: Enable credential leak monitoring under Dark Web Intelligence.

→ Credential leaks from breaches are monitored and flagged instantly.

17. Step 17: Enable VIP monitoring for executive exposure on social platforms.

→ Protection for executives against impersonation on social media.

18. Step 18: Schedule weekly reviews with security teams to validate FortiRecon findings.

→ Review meetings ensure that SOC stays ahead of current threats.

19. Step 19: Export vulnerability data for attack surface analysis under Reports > Export.

→ Export capabilities allow further forensic or risk analysis.

20. Step 20: Continuously refine threat coverage based on real-time alerts and FortiRecon
analytics.

→ FortiRecon adapts as threat landscape changes using analytics.

You might also like