Fortinet 1.2.0 manual To create tasks for e-Discovery Go to Analysis e-Discovery, Criteria From

Page 71

 

 

Analysis

e-Discovery

Date Range The time period for the archived email messages that you want to search.

From

Select the calendar icon and then select the start

 

date.

To

Select the calendar icon and then select the end date.

Email Search Enter the appropriate criteria for the search using the following:

Criteria

From

Enter the email address or addresses of the sender or

 

senders. Use a comma to separate multiple email

 

addresses.

To

Enter the address or addresses of the receiver or

 

receivers. Use a comma to separate multiple email

 

addresses.

Subject

Enter the subject line of the email message or

 

messages. If there is a common keyword in the

 

subject line of the emails you are looking for, enter the

 

keyword.

Body

Enter the keywords of the body of the email message

 

or messages.

Attachment

Enter the names of any attachments that came with

Name

the email message or messages.

To create tasks for e-Discovery

1Go to Analysis > e-Discovery.

2In Tasks, select New Task.

3Enter the appropriate information in the available fields.

4Select Submit.

To copy a task and apply it to a new task

1Go to Analysis > e-Discovery.

2In Tasks, select Copy Task in the Action column.

3Change the appropriate information for the new task.

4Select Submit.

To delete a task

1Go to Analysis > e-Discovery.

2In Tasks, select Delete Task in the Action column.

FortiGuard Analysis and Management Service Version 1.2.0 Administration Guide

 

13-12000-406-20081031

73

Image 71
Contents M I N I S T R a T I O N G U I D E Trademarks Contents Deleting log files from the FortiGate web-based manager ManagementAnalysis Customizing the log viewIndex Page Document conventions About this documentFortinet Knowledge Center Fortinet documentationTypographic conventions Fortinet Tools and Documentation CDCustomer service and technical support Customer service and technical support About the portal web site SetupPortal web site Report Management main menuScript Log out Obtaining a trial contractSection HelpTo obtain a trial contract Expand Arrow Configuring a device to use the serviceConfiguring remote logging and central management Functionality could be affected To configure remote logging to the serviceTo configure remote management by the service Central Management options Expanding or renewing serviceTo add a renewal contract Renewing contractsAdding purchased contracts To add a purchased contract to a Service Account IDAdding a purchased contract Required port numbers Required port numbers Dashboard main menu DashboardCustomized Dashboard WidgetsTo add and customize a Configuring widgetsConfiguring the Resource Monitor Adding and customizing pagesConfiguring the Network Monitor Add Another Configuring the Trap ConsoleAdditional Selection Configuring the Report widgets From date Chart TypeTop Level Field Report periodTop Color Bar chart onlyTo date To customize the Dashboard Customizing the DashboardCustomizing the Dashboard Viewing device information DeviceFirmware VolumeAdd Device Host NameTo add a device Go to Management Device Adding and editing devicesTo edit a device Go to Management Device Authorizing the service on devicesDe-authorizing the service on devices To authorize service on a device Go to Management DeviceViewing configuration revisions Sending manual or automatic configuration revisionsSearching configuration revisions Comparing configuration revisions Compared With Restoring configuration revisionsTo restore a configuration revision or script Original RevisionScheduled Time GMTtimezone Script Running scriptsViewing available firmware images To run a script Go to Management Device Device DetailTo schedule a firmware change Go to Management Device Changing firmware from the portal web siteTo immediately change firmware ScriptsChanging firmware from the device Creating scripts Checkin-User Viewing available configuration scriptsUpload InputTopology Tool Network diagram in View modeEdit Mode menus View Mode menusTo create a network diagram Go to Management Topology Tool Creating a network diagramTo view a network diagram Go to Management Topology Tool SettingsViewing a network diagram Viewing service account informationContract Contract serial number Details Web site Expiration Date the service contract expires ShowService Daily Maximum amount of disk space VolumeAdding, editing and removing administrators To edit your profile Go to Management Settings Editing your login profileTo add or edit account users Go to Management Settings To remove a user account Go to Management SettingsTo configure an alert profile Go to Management Settings Changing your service account IDConfiguring an alert profile To change the Service Account ID Go to Management SettingsName When nn occurrences within nnminhr Send to Message Analysis Viewing logs Log ViewerFormatted Raw Column Settings icon Period Recent SpecifiedLevel Customizing the log column views Customizing the log viewTo change the order of the columns Filtering logsTo show or hide columns To clear log filters Go to Analysis Log Viewer To filter logs Go to Analysis Log ViewerFrom Log File BrowserLog Files Log TypeTo delete any log files older than n months Deleting log files from the FortiGate web-based managerReports To download a log file Go to Analysis Log File BrowserViewing generated reports To delete a report Go to Analysis Report Deleting reportsTo view a generated report Go to Analysis Report Viewing e-Discovery tasks DiscoveryResult Task ListTask Name Creating TimeEnd Time ViewersCreate Time Start TimeDevices Creating tasks for e-DiscoveryAll Devices Attachment To create tasks for e-Discovery Go to Analysis e-DiscoveryTo delete a task Go to Analysis e-Discovery Criteria FromDiscovery Index 13-12000-406-20081031

1.2.0 specifications

Fortinet has consistently been at the forefront of cybersecurity solutions, and with the release of Fortinet 1.2.0, they have further solidified their commitment to providing robust and effective security solutions. This updated version integrates several advanced features and technologies designed to address the evolving threat landscape faced by organizations today.

One of the main highlights of Fortinet 1.2.0 is its enhanced security capabilities. The new version incorporates advanced threat intelligence powered by FortiGuard Labs, which allows for real-time detection of emerging threats. This integration ensures that organizations can proactively respond to potential security breaches, minimizing the impact on their operations.

Another key characteristic of Fortinet 1.2.0 is its improved performance metrics. With optimized processing algorithms and updated hardware support, the solution can handle increased traffic loads without compromising performance. This is particularly vital as businesses expand their digital footprint and require solutions that can scale effectively without lag.

Fortinet 1.2.0 also emphasizes automation and orchestration in cybersecurity processes. With its new Threat Response and Mitigation (TRM) feature, organizations can automate threat detection and response. This streamlines incident response workflows, allowing security teams to focus on more strategic initiatives rather than manual and time-consuming tasks.

Additionally, this version introduces enhanced integration capabilities with popular DevOps tools, facilitating seamless collaboration between security and development teams. This alignment is crucial in today’s fast-paced digital environment, where the speed of development needs to be balanced with security protocols.

Furthermore, Fortinet 1.2.0 offers improved user experience with a more intuitive interface and customizable dashboards. This allows security professionals to quickly access critical information and make informed decisions based on real-time data.

In summary, Fortinet 1.2.0 embodies a comprehensive approach to cybersecurity, combining advanced threat intelligence, enhanced performance, automation, integration with DevOps tools, and a user-friendly interface. As organizations continue to navigate dynamic digital challenges, Fortinet provides the necessary tools to safeguard their assets and ensure business continuity. With its robust feature set and innovative technologies, Fortinet 1.2.0 stands out as a pivotal solution in the cybersecurity landscape.