Fortinet 1.2.0 manual Top Level Field, Chart Type, Report period, From date

Page 31

 

 

Dashboard

Configuring widgets

Event Report – provides information about event activity that is based on event logs, such as an administrator logging in to that device’s web-based manager.

Virus Report – provides specific information about each real or suspected virus that the device detects; selecting the name of a virus redirects you to the FortiGuard Center Virus Encyclopedia for additional information

IPS Report – provides information about IPS anomalies and signatures

Web Report – provides information about Internet activity and visited web sites

Spam Report – provides information about spam activity

Report Browser – displays all reports that are generated; this widget displays the same information as in Analysis > Report, and does not need to be configured.

To configure a report widget, select the report widget in Add Widgets, follow the instructions in the table below, and select OK. If you want to edit an existing report widget, select the Edit icon in the widget and then follow the instructions in the table below. Select OK to save the changed settings.

Figure 15: Report configuration screen (Traffic Report displayed)

Title

Enter the name of the report. For example, Headquarters_Traffic

 

indicates the type of report and specific context.

Top Level Field

Enter the level of information that appears first. For example, you

 

would select Source from the Top Level list in a Traffic Report to

 

have the source IP addresses display first.

Second Level Field Enter the level of information that gives details about the top level information.

You can access this information by selecting the top level information (for example, a bar in the bar chart).

Device

Select the device from which to gather the information.

Chart Type

Select the type of chart used for displaying the information, either a

 

bar chart (default) or a pie chart.

Report period

Select the period of time when these activities or events happened.

 

For example, select 24 hours to display the last 24 hours of network

 

traffic.

 

 

If you want to specify a time range, select Specify from the list. The

 

options From date and To date appear.

 

From date

The start date and time of the time range. Appears

 

 

only when Specify is selected in Report period.

Select the calendar to configure a start date and time. Select OK after configuring both the date and time.

FortiGuard Analysis and Management Service Version 1.2.0 Administration Guide

13-12000-406-20081031

31

Image 31
Contents M I N I S T R a T I O N G U I D E Trademarks Contents Deleting log files from the FortiGate web-based manager ManagementAnalysis Customizing the log viewIndex Page Document conventions About this documentFortinet Knowledge Center Fortinet documentationTypographic conventions Fortinet Tools and Documentation CDCustomer service and technical support Customer service and technical support About the portal web site SetupPortal web site Script Management main menuReport Log out Obtaining a trial contractSection HelpTo obtain a trial contract Expand Arrow Configuring a device to use the serviceConfiguring remote logging and central management To configure remote management by the service To configure remote logging to the serviceFunctionality could be affected Central Management options Expanding or renewing serviceTo add a renewal contract Renewing contractsAdding purchased contracts To add a purchased contract to a Service Account IDAdding a purchased contract Required port numbers Required port numbers Dashboard main menu DashboardCustomized Dashboard WidgetsTo add and customize a Configuring widgetsConfiguring the Resource Monitor Adding and customizing pagesConfiguring the Network Monitor Additional Selection Configuring the Trap ConsoleAdd Another Configuring the Report widgets From date Chart TypeTop Level Field Report periodTo date Color Bar chart onlyTop To customize the Dashboard Customizing the DashboardCustomizing the Dashboard Viewing device information DeviceFirmware VolumeAdd Device Host NameTo add a device Go to Management Device Adding and editing devicesTo edit a device Go to Management Device Authorizing the service on devicesDe-authorizing the service on devices To authorize service on a device Go to Management DeviceViewing configuration revisions Sending manual or automatic configuration revisionsSearching configuration revisions Comparing configuration revisions Compared With Restoring configuration revisionsTo restore a configuration revision or script Original RevisionScheduled Time GMTtimezone Script Running scriptsViewing available firmware images To run a script Go to Management Device Device DetailTo schedule a firmware change Go to Management Device Changing firmware from the portal web siteChanging firmware from the device ScriptsTo immediately change firmware Creating scripts Checkin-User Viewing available configuration scriptsUpload InputTopology Tool Network diagram in View modeEdit Mode menus View Mode menusTo create a network diagram Go to Management Topology Tool Creating a network diagramTo view a network diagram Go to Management Topology Tool SettingsViewing a network diagram Viewing service account informationContract Contract serial number Details Web site Expiration Date the service contract expires ShowService Daily Maximum amount of disk space VolumeAdding, editing and removing administrators To edit your profile Go to Management Settings Editing your login profileTo add or edit account users Go to Management Settings To remove a user account Go to Management SettingsTo configure an alert profile Go to Management Settings Changing your service account IDConfiguring an alert profile To change the Service Account ID Go to Management SettingsName When nn occurrences within nnminhr Send to Message Analysis Viewing logs Log ViewerLevel Column Settings icon Period Recent SpecifiedFormatted Raw Customizing the log column views Customizing the log viewTo show or hide columns Filtering logsTo change the order of the columns To clear log filters Go to Analysis Log Viewer To filter logs Go to Analysis Log ViewerFrom Log File BrowserLog Files Log TypeTo delete any log files older than n months Deleting log files from the FortiGate web-based managerReports To download a log file Go to Analysis Log File BrowserViewing generated reports To view a generated report Go to Analysis Report Deleting reportsTo delete a report Go to Analysis Report Viewing e-Discovery tasks DiscoveryResult Task ListTask Name Creating TimeEnd Time ViewersCreate Time Start TimeAll Devices Creating tasks for e-DiscoveryDevices Attachment To create tasks for e-Discovery Go to Analysis e-DiscoveryTo delete a task Go to Analysis e-Discovery Criteria FromDiscovery Index 13-12000-406-20081031

1.2.0 specifications

Fortinet has consistently been at the forefront of cybersecurity solutions, and with the release of Fortinet 1.2.0, they have further solidified their commitment to providing robust and effective security solutions. This updated version integrates several advanced features and technologies designed to address the evolving threat landscape faced by organizations today.

One of the main highlights of Fortinet 1.2.0 is its enhanced security capabilities. The new version incorporates advanced threat intelligence powered by FortiGuard Labs, which allows for real-time detection of emerging threats. This integration ensures that organizations can proactively respond to potential security breaches, minimizing the impact on their operations.

Another key characteristic of Fortinet 1.2.0 is its improved performance metrics. With optimized processing algorithms and updated hardware support, the solution can handle increased traffic loads without compromising performance. This is particularly vital as businesses expand their digital footprint and require solutions that can scale effectively without lag.

Fortinet 1.2.0 also emphasizes automation and orchestration in cybersecurity processes. With its new Threat Response and Mitigation (TRM) feature, organizations can automate threat detection and response. This streamlines incident response workflows, allowing security teams to focus on more strategic initiatives rather than manual and time-consuming tasks.

Additionally, this version introduces enhanced integration capabilities with popular DevOps tools, facilitating seamless collaboration between security and development teams. This alignment is crucial in today’s fast-paced digital environment, where the speed of development needs to be balanced with security protocols.

Furthermore, Fortinet 1.2.0 offers improved user experience with a more intuitive interface and customizable dashboards. This allows security professionals to quickly access critical information and make informed decisions based on real-time data.

In summary, Fortinet 1.2.0 embodies a comprehensive approach to cybersecurity, combining advanced threat intelligence, enhanced performance, automation, integration with DevOps tools, and a user-friendly interface. As organizations continue to navigate dynamic digital challenges, Fortinet provides the necessary tools to safeguard their assets and ensure business continuity. With its robust feature set and innovative technologies, Fortinet 1.2.0 stands out as a pivotal solution in the cybersecurity landscape.