Fortinet 1.2.0 manual To filter logs Go to Analysis Log Viewer

Page 62

Customizing the log view

Analysis

Figure 30: Filter icons for logs

 

 

 

 

Filter icon

 

 

Filter icon

enabled

disabled

 

 

When filtering by source or destination IP, you can use the following in the filtering criteria:

a single address (2.2.2.2)

an address range using a wild card (1.2.2.*)

an address range (1.2.2.1-1.2.2.100)

You can also use a Boolean operator (“or”) to indicate mutually exclusive choices:

1.1.1.1 or 2.2.2.2

1.1.1.1 or 2.2.2.*

1.1.1.1 or 2.2.2.1-2.2.2.10

To filter logs

1Go to Analysis > Log Viewer.

2Select a log type to view log messages from.

3Go to a column in the log type.

4Select the filter icon in that column’s heading.

5Using the arrows, move the appropriate keywords from Available Fields to Display Fields.

6Select Submit.

To clear log filters

1Go to Analysis > Log Viewer.

2Select the log type that contains the column filter that you want to clear.

3Go to the column.

4Select the filter icon in that column’s heading.

5Using the double arrows, move the keywords from Display Fields to Available Fields.

6Select Submit.

7Repeat steps 2 to 6 for each filter.

 

FortiGuard Analysis and Management Service Version 1.2.0 Administration Guide

64

13-12000-406-20081031

Image 62
Contents M I N I S T R a T I O N G U I D E Trademarks Contents Customizing the log view ManagementAnalysis Deleting log files from the FortiGate web-based managerIndex Page About this document Document conventionsFortinet Tools and Documentation CD Fortinet documentationTypographic conventions Fortinet Knowledge CenterCustomer service and technical support Customer service and technical support Setup About the portal web sitePortal web site Report Management main menuScript Help Obtaining a trial contractSection Log outTo obtain a trial contract Configuring a device to use the service Expand ArrowConfiguring remote logging and central management Functionality could be affected To configure remote logging to the serviceTo configure remote management by the service Expanding or renewing service Central Management optionsRenewing contracts To add a renewal contractTo add a purchased contract to a Service Account ID Adding purchased contractsAdding a purchased contract Required port numbers Required port numbers Dashboard Dashboard main menuWidgets Customized DashboardAdding and customizing pages Configuring widgetsConfiguring the Resource Monitor To add and customize aConfiguring the Network Monitor Add Another Configuring the Trap ConsoleAdditional Selection Configuring the Report widgets Report period Chart TypeTop Level Field From dateTop Color Bar chart onlyTo date Customizing the Dashboard To customize the DashboardCustomizing the Dashboard Device Viewing device informationHost Name VolumeAdd Device FirmwareAdding and editing devices To add a device Go to Management DeviceTo authorize service on a device Go to Management Device Authorizing the service on devicesDe-authorizing the service on devices To edit a device Go to Management DeviceSending manual or automatic configuration revisions Viewing configuration revisionsSearching configuration revisions Comparing configuration revisions Original Revision Restoring configuration revisionsTo restore a configuration revision or script Compared WithTo run a script Go to Management Device Device Detail Running scriptsViewing available firmware images Scheduled Time GMTtimezone ScriptChanging firmware from the portal web site To schedule a firmware change Go to Management DeviceTo immediately change firmware ScriptsChanging firmware from the device Creating scripts Input Viewing available configuration scriptsUpload Checkin-UserNetwork diagram in View mode Topology ToolView Mode menus Edit Mode menusCreating a network diagram To create a network diagram Go to Management Topology ToolViewing service account information SettingsViewing a network diagram To view a network diagram Go to Management Topology ToolDaily Maximum amount of disk space Volume Web site Expiration Date the service contract expires ShowService Contract Contract serial number DetailsAdding, editing and removing administrators To remove a user account Go to Management Settings Editing your login profileTo add or edit account users Go to Management Settings To edit your profile Go to Management SettingsTo change the Service Account ID Go to Management Settings Changing your service account IDConfiguring an alert profile To configure an alert profile Go to Management SettingsName When nn occurrences within nnminhr Send to Message Analysis Log Viewer Viewing logsFormatted Raw Column Settings icon Period Recent SpecifiedLevel Customizing the log view Customizing the log column viewsTo change the order of the columns Filtering logsTo show or hide columns To filter logs Go to Analysis Log Viewer To clear log filters Go to Analysis Log ViewerLog Type Log File BrowserLog Files FromTo download a log file Go to Analysis Log File Browser Deleting log files from the FortiGate web-based managerReports To delete any log files older than n monthsViewing generated reports To delete a report Go to Analysis Report Deleting reportsTo view a generated report Go to Analysis Report Discovery Viewing e-Discovery tasksCreating Time Task ListTask Name ResultStart Time ViewersCreate Time End TimeDevices Creating tasks for e-DiscoveryAll Devices Criteria From To create tasks for e-Discovery Go to Analysis e-DiscoveryTo delete a task Go to Analysis e-Discovery AttachmentDiscovery Index 13-12000-406-20081031

1.2.0 specifications

Fortinet has consistently been at the forefront of cybersecurity solutions, and with the release of Fortinet 1.2.0, they have further solidified their commitment to providing robust and effective security solutions. This updated version integrates several advanced features and technologies designed to address the evolving threat landscape faced by organizations today.

One of the main highlights of Fortinet 1.2.0 is its enhanced security capabilities. The new version incorporates advanced threat intelligence powered by FortiGuard Labs, which allows for real-time detection of emerging threats. This integration ensures that organizations can proactively respond to potential security breaches, minimizing the impact on their operations.

Another key characteristic of Fortinet 1.2.0 is its improved performance metrics. With optimized processing algorithms and updated hardware support, the solution can handle increased traffic loads without compromising performance. This is particularly vital as businesses expand their digital footprint and require solutions that can scale effectively without lag.

Fortinet 1.2.0 also emphasizes automation and orchestration in cybersecurity processes. With its new Threat Response and Mitigation (TRM) feature, organizations can automate threat detection and response. This streamlines incident response workflows, allowing security teams to focus on more strategic initiatives rather than manual and time-consuming tasks.

Additionally, this version introduces enhanced integration capabilities with popular DevOps tools, facilitating seamless collaboration between security and development teams. This alignment is crucial in today’s fast-paced digital environment, where the speed of development needs to be balanced with security protocols.

Furthermore, Fortinet 1.2.0 offers improved user experience with a more intuitive interface and customizable dashboards. This allows security professionals to quickly access critical information and make informed decisions based on real-time data.

In summary, Fortinet 1.2.0 embodies a comprehensive approach to cybersecurity, combining advanced threat intelligence, enhanced performance, automation, integration with DevOps tools, and a user-friendly interface. As organizations continue to navigate dynamic digital challenges, Fortinet provides the necessary tools to safeguard their assets and ensure business continuity. With its robust feature set and innovative technologies, Fortinet 1.2.0 stands out as a pivotal solution in the cybersecurity landscape.