A binary analysis connector using fortisandbox.
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Type Name Latest commit message Commit time
Failed to load latest commit information.


Carbon Black - FortiSandbox Connector

The Fortisandbox connector submits binaries collected by Carbon Black to a Fortinet Fortisandbox appliance for binary analysis. The results are collected and placed into an Intelligence Feed on your Carbon Black server. The feed will then tag any binaries executed on your endpoints identified as malware by Fortisandbox. Only binaries submitted by the connector for analysis will be included in the generated Intelligence Feed.

This connector submits full binaries by default, and binaries may be shared with Fortinet based on the configuration on your Fortisandbox appliance.

Installation Quickstart

As root on your Carbon Black or other RPM based 64-bit Linux distribution server:

cd /etc/yum.repos.d
curl -O https://opensource.carbonblack.com/release/x86_64/CbOpenSource.repo
yum install python-cb-fortisandbox-connector

Once the software is installed via YUM, copy the /etc/cb/integrations/fortisandbox/connector.conf.example file to /etc/cb/integrations/fortisandbox/connector.conf. Edit this file and place your Carbon Black API key into the carbonblack_server_token variable and your Carbon Black server's base URL into the carbonblack_server_url variable.

Then you must place your credentials for Fortisandbox into the configuration file: place the username into the fortisandbox_username variable, and the password into the 'fortisandbox_password' variable in the /etc/cb/integrations/fortisandbox/connector.conf file.

Adjust the 'fortisandbox_url' variable in the connector configuration file to use the hostname/ip address of the Fortisandbox to be used.

Any errors will be logged into /var/log/cb/integrations/fortisandbox/fortisandbox.log.


If you suspect a problem, please first look at the Fortisandbox connector logs found here: /var/log/cb/integrations/fortisandbox/fortisandbox.log (There might be multiple files as the logger "rolls over" when the log file hits a certain size).

If you want to re-run the analysis across your binaries:

  1. Stop the service: service cb-fortisandbox-connector stop
  2. Remove the database file: rm /usr/share/cb/integrations/fortisandbox/db/sqlite.db
  3. Remove the feed from your Cb server's Threat Intelligence page
  4. Restart the service: service cb-fortisandbox-connector start

Contacting Carbon Black Developer Relations Support

Web: https://community.carbonblack.com/groups/developer-relations E-mail: dev-support@bcarbonblack.com

Reporting Problems

When you contact Carbon Black Developer Relations Technical Support with an issue, please provide the following:

  • Your name, company name, telephone number, and e-mail address
  • Product name/version, CB Server version, CB Sensor version
  • Hardware configuration of the Carbon Black Server or computer (processor, memory, and RAM)
  • For documentation issues, specify the version of the manual you are using.
  • Action causing the problem, error message returned, and event log output (as appropriate)
  • Problem severity