Fortinet 1.2.0 manual Filtering logs, To show or hide columns, To change the order of the columns

Page 61

 

 

Analysis

Customizing the log view

Figure 29: Column Display Settings window for Event log

To show or hide columns

1Select Column Settings.

A list of columns available for that log type appears.

2Select columns that you want displayed or hidden by doing one of the following:

Select a column name in the Available Fields area to add or remove a single column, then select a single arrow to move the column to the Display Fields area.

Select the double arrow to add or remove all columns.

Select Default to return all columns to their default displayed/hidden status.

3Select Submit.

You can revert to the default column settings by selecting Default.

To change the order of the columns

1Select Column Settings.

A list of columns available for the log type appears.

2Select a column name.

3Select the up or down arrows to change the position of the column in the list.

4Repeat steps 2 and 3 until all columns are re-arranged in the order you want.

5Select Submit.

Filtering logs

You can filter log messages by using the filter icon to find specific content when viewing them in the Log Viewer tab. Log filters appear for certain columns only.

The filter setting is disabled by default and displays the filter icon in gray. When enabled, the filter icon appears green.

FortiGuard Analysis and Management Service Version 1.2.0 Administration Guide

 

13-12000-406-20081031

63

Image 61
Contents M I N I S T R a T I O N G U I D E Trademarks Contents Analysis ManagementCustomizing the log view Deleting log files from the FortiGate web-based managerIndex Page Document conventions About this documentTypographic conventions Fortinet documentationFortinet Tools and Documentation CD Fortinet Knowledge CenterCustomer service and technical support Customer service and technical support About the portal web site SetupPortal web site Script Management main menuReport Section Obtaining a trial contractHelp Log outTo obtain a trial contract Expand Arrow Configuring a device to use the serviceConfiguring remote logging and central management To configure remote management by the service To configure remote logging to the serviceFunctionality could be affected Central Management options Expanding or renewing serviceTo add a renewal contract Renewing contractsAdding purchased contracts To add a purchased contract to a Service Account IDAdding a purchased contract Required port numbers Required port numbers Dashboard main menu DashboardCustomized Dashboard WidgetsConfiguring the Resource Monitor Configuring widgetsAdding and customizing pages To add and customize aConfiguring the Network Monitor Additional Selection Configuring the Trap ConsoleAdd Another Configuring the Report widgets Top Level Field Chart TypeReport period From dateTo date Color Bar chart onlyTop To customize the Dashboard Customizing the DashboardCustomizing the Dashboard Viewing device information DeviceAdd Device VolumeHost Name FirmwareTo add a device Go to Management Device Adding and editing devicesDe-authorizing the service on devices Authorizing the service on devicesTo authorize service on a device Go to Management Device To edit a device Go to Management DeviceViewing configuration revisions Sending manual or automatic configuration revisionsSearching configuration revisions Comparing configuration revisions To restore a configuration revision or script Restoring configuration revisionsOriginal Revision Compared WithViewing available firmware images Running scriptsTo run a script Go to Management Device Device Detail Scheduled Time GMTtimezone ScriptTo schedule a firmware change Go to Management Device Changing firmware from the portal web siteChanging firmware from the device ScriptsTo immediately change firmware Creating scripts Upload Viewing available configuration scriptsInput Checkin-UserTopology Tool Network diagram in View modeEdit Mode menus View Mode menusTo create a network diagram Go to Management Topology Tool Creating a network diagramViewing a network diagram SettingsViewing service account information To view a network diagram Go to Management Topology ToolService Web site Expiration Date the service contract expires ShowDaily Maximum amount of disk space Volume Contract Contract serial number DetailsAdding, editing and removing administrators To add or edit account users Go to Management Settings Editing your login profileTo remove a user account Go to Management Settings To edit your profile Go to Management SettingsConfiguring an alert profile Changing your service account IDTo change the Service Account ID Go to Management Settings To configure an alert profile Go to Management SettingsName When nn occurrences within nnminhr Send to Message Analysis Viewing logs Log ViewerLevel Column Settings icon Period Recent SpecifiedFormatted Raw Customizing the log column views Customizing the log viewTo show or hide columns Filtering logsTo change the order of the columns To clear log filters Go to Analysis Log Viewer To filter logs Go to Analysis Log ViewerLog Files Log File BrowserLog Type FromReports Deleting log files from the FortiGate web-based managerTo download a log file Go to Analysis Log File Browser To delete any log files older than n monthsViewing generated reports To view a generated report Go to Analysis Report Deleting reportsTo delete a report Go to Analysis Report Viewing e-Discovery tasks DiscoveryTask Name Task ListCreating Time ResultCreate Time ViewersStart Time End TimeAll Devices Creating tasks for e-DiscoveryDevices To delete a task Go to Analysis e-Discovery To create tasks for e-Discovery Go to Analysis e-DiscoveryCriteria From AttachmentDiscovery Index 13-12000-406-20081031

1.2.0 specifications

Fortinet has consistently been at the forefront of cybersecurity solutions, and with the release of Fortinet 1.2.0, they have further solidified their commitment to providing robust and effective security solutions. This updated version integrates several advanced features and technologies designed to address the evolving threat landscape faced by organizations today.

One of the main highlights of Fortinet 1.2.0 is its enhanced security capabilities. The new version incorporates advanced threat intelligence powered by FortiGuard Labs, which allows for real-time detection of emerging threats. This integration ensures that organizations can proactively respond to potential security breaches, minimizing the impact on their operations.

Another key characteristic of Fortinet 1.2.0 is its improved performance metrics. With optimized processing algorithms and updated hardware support, the solution can handle increased traffic loads without compromising performance. This is particularly vital as businesses expand their digital footprint and require solutions that can scale effectively without lag.

Fortinet 1.2.0 also emphasizes automation and orchestration in cybersecurity processes. With its new Threat Response and Mitigation (TRM) feature, organizations can automate threat detection and response. This streamlines incident response workflows, allowing security teams to focus on more strategic initiatives rather than manual and time-consuming tasks.

Additionally, this version introduces enhanced integration capabilities with popular DevOps tools, facilitating seamless collaboration between security and development teams. This alignment is crucial in today’s fast-paced digital environment, where the speed of development needs to be balanced with security protocols.

Furthermore, Fortinet 1.2.0 offers improved user experience with a more intuitive interface and customizable dashboards. This allows security professionals to quickly access critical information and make informed decisions based on real-time data.

In summary, Fortinet 1.2.0 embodies a comprehensive approach to cybersecurity, combining advanced threat intelligence, enhanced performance, automation, integration with DevOps tools, and a user-friendly interface. As organizations continue to navigate dynamic digital challenges, Fortinet provides the necessary tools to safeguard their assets and ensure business continuity. With its robust feature set and innovative technologies, Fortinet 1.2.0 stands out as a pivotal solution in the cybersecurity landscape.