Fortinet 1.2.0 manual Viewing e-Discovery tasks

Page 67

 

 

Analysis

e-Discovery

4Select the dates using the calendars in Delete Reports.

When selecting dates, remember that reports within the time period will be deleted as well. For example, if you select September 1 to September 5, the reports generated on September 2, 3, and 4 will also be deleted.

5Select Submit.

e-Discovery

The e-Discovery tab allows third-party administrators to search through email messages, view what searches are taking place, or create new searches. These searches are referred to as tasks. Users with the e-Discovery administrator role can also view these tasks or create new ones.

The following topics are included in this section:

Viewing e-Discovery tasks

Creating tasks for e-Discovery

Viewing e-Discovery tasks

You can view e-Discovery tasks from the Tasks section of e-Discovery. If users have the e-Discovery administrator role, this is the only menu that is accessible to them.

When you select a task from the Task List section and then select the Task Detail tab, details about the task display in the Basic Information section, such as who created the task, the start and end times, and who is allowed to view the task. The Search Criteria section displays information about the search, such as the email address for the receiver and sender, device, and time period.

To view the e-Discovery tasks, go to Analysis > e-Discovery.

FortiGuard Analysis and Management Service Version 1.2.0 Administration Guide

 

13-12000-406-20081031

69

Image 67
Contents M I N I S T R a T I O N G U I D E Trademarks Contents Deleting log files from the FortiGate web-based manager ManagementAnalysis Customizing the log viewIndex Page Document conventions About this documentFortinet Knowledge Center Fortinet documentationTypographic conventions Fortinet Tools and Documentation CDCustomer service and technical support Customer service and technical support About the portal web site SetupPortal web site Script Management main menuReport Log out Obtaining a trial contractSection HelpTo obtain a trial contract Expand Arrow Configuring a device to use the serviceConfiguring remote logging and central management To configure remote management by the service To configure remote logging to the serviceFunctionality could be affected Central Management options Expanding or renewing serviceTo add a renewal contract Renewing contractsAdding purchased contracts To add a purchased contract to a Service Account IDAdding a purchased contract Required port numbers Required port numbers Dashboard main menu DashboardCustomized Dashboard WidgetsTo add and customize a Configuring widgetsConfiguring the Resource Monitor Adding and customizing pagesConfiguring the Network Monitor Additional Selection Configuring the Trap ConsoleAdd Another Configuring the Report widgets From date Chart TypeTop Level Field Report periodTo date Color Bar chart onlyTop To customize the Dashboard Customizing the DashboardCustomizing the Dashboard Viewing device information DeviceFirmware VolumeAdd Device Host NameTo add a device Go to Management Device Adding and editing devicesTo edit a device Go to Management Device Authorizing the service on devicesDe-authorizing the service on devices To authorize service on a device Go to Management DeviceViewing configuration revisions Sending manual or automatic configuration revisionsSearching configuration revisions Comparing configuration revisions Compared With Restoring configuration revisionsTo restore a configuration revision or script Original RevisionScheduled Time GMTtimezone Script Running scriptsViewing available firmware images To run a script Go to Management Device Device DetailTo schedule a firmware change Go to Management Device Changing firmware from the portal web siteChanging firmware from the device ScriptsTo immediately change firmware Creating scripts Checkin-User Viewing available configuration scriptsUpload InputTopology Tool Network diagram in View modeEdit Mode menus View Mode menusTo create a network diagram Go to Management Topology Tool Creating a network diagramTo view a network diagram Go to Management Topology Tool SettingsViewing a network diagram Viewing service account informationContract Contract serial number Details Web site Expiration Date the service contract expires ShowService Daily Maximum amount of disk space VolumeAdding, editing and removing administrators To edit your profile Go to Management Settings Editing your login profileTo add or edit account users Go to Management Settings To remove a user account Go to Management SettingsTo configure an alert profile Go to Management Settings Changing your service account IDConfiguring an alert profile To change the Service Account ID Go to Management SettingsName When nn occurrences within nnminhr Send to Message Analysis Viewing logs Log ViewerLevel Column Settings icon Period Recent SpecifiedFormatted Raw Customizing the log column views Customizing the log viewTo show or hide columns Filtering logsTo change the order of the columns To clear log filters Go to Analysis Log Viewer To filter logs Go to Analysis Log ViewerFrom Log File BrowserLog Files Log TypeTo delete any log files older than n months Deleting log files from the FortiGate web-based managerReports To download a log file Go to Analysis Log File BrowserViewing generated reports To view a generated report Go to Analysis Report Deleting reportsTo delete a report Go to Analysis Report Viewing e-Discovery tasks DiscoveryResult Task ListTask Name Creating TimeEnd Time ViewersCreate Time Start TimeAll Devices Creating tasks for e-DiscoveryDevices Attachment To create tasks for e-Discovery Go to Analysis e-DiscoveryTo delete a task Go to Analysis e-Discovery Criteria FromDiscovery Index 13-12000-406-20081031

1.2.0 specifications

Fortinet has consistently been at the forefront of cybersecurity solutions, and with the release of Fortinet 1.2.0, they have further solidified their commitment to providing robust and effective security solutions. This updated version integrates several advanced features and technologies designed to address the evolving threat landscape faced by organizations today.

One of the main highlights of Fortinet 1.2.0 is its enhanced security capabilities. The new version incorporates advanced threat intelligence powered by FortiGuard Labs, which allows for real-time detection of emerging threats. This integration ensures that organizations can proactively respond to potential security breaches, minimizing the impact on their operations.

Another key characteristic of Fortinet 1.2.0 is its improved performance metrics. With optimized processing algorithms and updated hardware support, the solution can handle increased traffic loads without compromising performance. This is particularly vital as businesses expand their digital footprint and require solutions that can scale effectively without lag.

Fortinet 1.2.0 also emphasizes automation and orchestration in cybersecurity processes. With its new Threat Response and Mitigation (TRM) feature, organizations can automate threat detection and response. This streamlines incident response workflows, allowing security teams to focus on more strategic initiatives rather than manual and time-consuming tasks.

Additionally, this version introduces enhanced integration capabilities with popular DevOps tools, facilitating seamless collaboration between security and development teams. This alignment is crucial in today’s fast-paced digital environment, where the speed of development needs to be balanced with security protocols.

Furthermore, Fortinet 1.2.0 offers improved user experience with a more intuitive interface and customizable dashboards. This allows security professionals to quickly access critical information and make informed decisions based on real-time data.

In summary, Fortinet 1.2.0 embodies a comprehensive approach to cybersecurity, combining advanced threat intelligence, enhanced performance, automation, integration with DevOps tools, and a user-friendly interface. As organizations continue to navigate dynamic digital challenges, Fortinet provides the necessary tools to safeguard their assets and ensure business continuity. With its robust feature set and innovative technologies, Fortinet 1.2.0 stands out as a pivotal solution in the cybersecurity landscape.