Fortinet 1.2.0 manual Configuring remote logging and central management

Page 17

 

 

Setup

Configuring a device to use the service

2Select the Expand Arrow beside Analysis & Management Service Options to reveal the available options.

3Enter the service account ID in the Account ID field.

The service account ID entered here will be used to identify that the device is associated with that service account.

4Select Apply.

In the FortiGuard Subscription Services area of the FortiGuard page, you should see a green checkmark in the Analysis & Management Service row, as in Figure 4. You should also see a green checkmark on the System dashboard of your device, under License Information (beside Analysis and Management Service). If you see an orange X, your device is not properly connected; if you see a gray X, your device is not connected. For more information, see “Verifying the connectivity between the service and the device” on page 17.

After successfully configuring your device, you also need to enable central management, and, if applicable, configure remote logging. For more information, see “Configuring remote logging and central management” on page 17.

Verifying the connectivity between the service and the device

The device connects to the Fortinet Distribution Network (FDN) to validate connectivity with that Service Account ID. After successful validation, the options for configuring and using the service become available on the device’s web-based manager. You should also see a green check mark beside Analysis and Management Services under License Information in the System dashboard of the device.

If you have not yet authorized the device to use the service, the service license status may appear to be Expired or Not Registered, and the device will not be able to connect to the service. To authorize the device, see “Authorizing the service on devices” on page 38.

If you have authorized the device from the portal web site, but the device is still unable to connect, verify that the device’s system time and time zone are correct. If these are incorrect, the SSL connection will fail; you must then enter the correct system time and zone on the FortiGate unit. For more information, see the FortiGate Administration Guide.

Configuring remote logging and central management

After configuring the Service Account ID on the device’s web-based manager, you need to also configure central management and, if applicable, logging. The service provides both central management of the device as well as logging and reporting capabilities.

The following procedures describe how to enable and configure both remote logging and central management.

FortiGuard Analysis and Management Service Version 1.2.0 Administration Guide

 

13-12000-406-20081031

17

Image 17
Contents M I N I S T R a T I O N G U I D E Trademarks Contents Analysis ManagementCustomizing the log view Deleting log files from the FortiGate web-based managerIndex Page Document conventions About this documentTypographic conventions Fortinet documentationFortinet Tools and Documentation CD Fortinet Knowledge CenterCustomer service and technical support Customer service and technical support About the portal web site SetupPortal web site Report Management main menuScript Section Obtaining a trial contractHelp Log outTo obtain a trial contract Expand Arrow Configuring a device to use the serviceConfiguring remote logging and central management Functionality could be affected To configure remote logging to the serviceTo configure remote management by the service Central Management options Expanding or renewing serviceTo add a renewal contract Renewing contractsAdding purchased contracts To add a purchased contract to a Service Account IDAdding a purchased contract Required port numbers Required port numbers Dashboard main menu DashboardCustomized Dashboard WidgetsConfiguring the Resource Monitor Configuring widgetsAdding and customizing pages To add and customize aConfiguring the Network Monitor Add Another Configuring the Trap ConsoleAdditional Selection Configuring the Report widgets Top Level Field Chart TypeReport period From dateTop Color Bar chart onlyTo date To customize the Dashboard Customizing the DashboardCustomizing the Dashboard Viewing device information DeviceAdd Device VolumeHost Name FirmwareTo add a device Go to Management Device Adding and editing devicesDe-authorizing the service on devices Authorizing the service on devicesTo authorize service on a device Go to Management Device To edit a device Go to Management DeviceViewing configuration revisions Sending manual or automatic configuration revisionsSearching configuration revisions Comparing configuration revisions To restore a configuration revision or script Restoring configuration revisionsOriginal Revision Compared WithViewing available firmware images Running scriptsTo run a script Go to Management Device Device Detail Scheduled Time GMTtimezone ScriptTo schedule a firmware change Go to Management Device Changing firmware from the portal web siteTo immediately change firmware ScriptsChanging firmware from the device Creating scripts Upload Viewing available configuration scriptsInput Checkin-UserTopology Tool Network diagram in View modeEdit Mode menus View Mode menusTo create a network diagram Go to Management Topology Tool Creating a network diagramViewing a network diagram SettingsViewing service account information To view a network diagram Go to Management Topology ToolService Web site Expiration Date the service contract expires ShowDaily Maximum amount of disk space Volume Contract Contract serial number DetailsAdding, editing and removing administrators To add or edit account users Go to Management Settings Editing your login profileTo remove a user account Go to Management Settings To edit your profile Go to Management SettingsConfiguring an alert profile Changing your service account IDTo change the Service Account ID Go to Management Settings To configure an alert profile Go to Management SettingsName When nn occurrences within nnminhr Send to Message Analysis Viewing logs Log ViewerFormatted Raw Column Settings icon Period Recent SpecifiedLevel Customizing the log column views Customizing the log viewTo change the order of the columns Filtering logsTo show or hide columns To clear log filters Go to Analysis Log Viewer To filter logs Go to Analysis Log ViewerLog Files Log File BrowserLog Type FromReports Deleting log files from the FortiGate web-based managerTo download a log file Go to Analysis Log File Browser To delete any log files older than n monthsViewing generated reports To delete a report Go to Analysis Report Deleting reportsTo view a generated report Go to Analysis Report Viewing e-Discovery tasks DiscoveryTask Name Task ListCreating Time ResultCreate Time ViewersStart Time End TimeDevices Creating tasks for e-DiscoveryAll Devices To delete a task Go to Analysis e-Discovery To create tasks for e-Discovery Go to Analysis e-DiscoveryCriteria From AttachmentDiscovery Index 13-12000-406-20081031

1.2.0 specifications

Fortinet has consistently been at the forefront of cybersecurity solutions, and with the release of Fortinet 1.2.0, they have further solidified their commitment to providing robust and effective security solutions. This updated version integrates several advanced features and technologies designed to address the evolving threat landscape faced by organizations today.

One of the main highlights of Fortinet 1.2.0 is its enhanced security capabilities. The new version incorporates advanced threat intelligence powered by FortiGuard Labs, which allows for real-time detection of emerging threats. This integration ensures that organizations can proactively respond to potential security breaches, minimizing the impact on their operations.

Another key characteristic of Fortinet 1.2.0 is its improved performance metrics. With optimized processing algorithms and updated hardware support, the solution can handle increased traffic loads without compromising performance. This is particularly vital as businesses expand their digital footprint and require solutions that can scale effectively without lag.

Fortinet 1.2.0 also emphasizes automation and orchestration in cybersecurity processes. With its new Threat Response and Mitigation (TRM) feature, organizations can automate threat detection and response. This streamlines incident response workflows, allowing security teams to focus on more strategic initiatives rather than manual and time-consuming tasks.

Additionally, this version introduces enhanced integration capabilities with popular DevOps tools, facilitating seamless collaboration between security and development teams. This alignment is crucial in today’s fast-paced digital environment, where the speed of development needs to be balanced with security protocols.

Furthermore, Fortinet 1.2.0 offers improved user experience with a more intuitive interface and customizable dashboards. This allows security professionals to quickly access critical information and make informed decisions based on real-time data.

In summary, Fortinet 1.2.0 embodies a comprehensive approach to cybersecurity, combining advanced threat intelligence, enhanced performance, automation, integration with DevOps tools, and a user-friendly interface. As organizations continue to navigate dynamic digital challenges, Fortinet provides the necessary tools to safeguard their assets and ensure business continuity. With its robust feature set and innovative technologies, Fortinet 1.2.0 stands out as a pivotal solution in the cybersecurity landscape.