How FortiSense detects risk without relying on signatures alone

Most endpoint security still revolves around one core idea:
identify something known to be bad, then block it.
That approach works, until it doesn’t.
FortiSense was built around a different question:
What signals appear before something is clearly malicious?
This post explains how FortiSense detects risk without relying solely on file signatures, and why that matters in modern environments.
Why signatures alone aren’t enough anymore
Signature-based detection is effective against known threats.
But many modern attacks deliberately avoid that territory by:
Using legitimate system tools
Running from temporary or user-writable locations
Living entirely in memory
Executing scripts instead of binaries
Changing hashes frequently
In these cases, there may be no known “bad” file to match against, at least not initially.
By the time a signature exists, the opportunity for early intervention may already be gone.
What FortiSense looks at instead
Rather than asking “is this file known to be malicious?”, FortiSense asks:
Does this behaviour make sense for this system, at this moment?
It does this by combining several classes of signals.
1. Behaviour and resource signals
Sudden changes often matter more than absolute values.
FortiSense monitors signals such as:
Unexpected CPU or memory spikes
Unusual outbound network activity
Processes behaving differently from their normal baseline
These don’t automatically mean compromise, but they can be early indicators that something is wrong.
2. Execution paths
Where something runs from matters.
Examples of higher-risk paths include:
Temporary directories
User-writable locations
Unexpected subdirectories
Mismatches between process name and location
A legitimate binary running from an unusual path can be more concerning than an unknown binary running from a standard one.
FortiSense surfaces this context directly in alerts.
3. Parent-child process chains
Processes don’t appear out of nowhere.
Understanding how something was launched is often more revealing than what it is.
FortiSense records:
The parent process
The launch chain where relevant
Whether the relationship is common or unusual
For example:
A shell launched by a system service may warrant scrutiny
A script launched by a known installer may not
This context helps differentiate abuse from normal activity.
4. Known-bad intelligence (when it exists)
Signatures still matter, just not exclusively.
FortiSense maintains a database of known malicious hashes and process names. When a match exists, it’s used.
The difference is that detection doesn’t stop there.
If no signature exists, behaviour still matters.
5. Signature and trust validation
System binaries are expected to behave, and be signed, in predictable ways.
FortiSense checks:
Whether binaries are digitally signed
Whether signatures are valid and verifiable
Whether trust expectations match reality
An unsigned or tampered system binary may indicate compromise, even if the file itself isn’t “known malware”.
Scoring instead of absolutes
Rather than making binary “good / bad” decisions, FortiSense assigns risk scores based on combined signals.
Each alert shows:
What contributed to the score
Why it crossed a threshold
What behaviour triggered concern
This avoids overconfidence while still surfacing meaningful risk.
Not everything unusual is malicious, but unusual things are worth seeing.
Why this matters for ransomware
Ransomware rarely starts with an obvious payload.
Early stages often include:
Script execution
Reconnaissance
Process chaining
Privilege escalation attempts
Unusual resource usage
These steps can happen minutes or hours before encryption begins.
Signature-based tools may not flag them.
Behavioural signals can.
FortiSense is designed to surface these early indicators, when there’s still time to intervene.
Detection that works offline
Many tools quietly assume always-on connectivity.
Real environments don’t.
FortiSense agents:
Cache critical intelligence locally
Continue evaluating behaviour while offline
Store telemetry securely
Upload data when connectivity resumes
This ensures detection doesn’t stop just because a system temporarily loses network access, especially important for servers and remote endpoints.
Why this approach stays lightweight
Behavioural detection doesn’t have to mean heavyweight agents or massive data collection.
FortiSense focuses on:
Key signals, not exhaustive telemetry
Local evaluation where possible
Short, purposeful retention windows
The result is meaningful visibility without the operational cost of full EDR.
Closing thoughts
Modern threats don’t announce themselves with signatures.
They blend in, misuse legitimate tools, and rely on silence.
Detecting them early requires context, not just databases.
FortiSense is built to surface that context, clearly, transparently, and without overwhelming the people using it.
Want to see what early signals look like on your own systems?
FortiSense is free to evaluate, install the agent and observe real behaviour in your environment.
Join Founders Access for beta features and direct support during development.
Learn more →