Analysis

Log File Browser

Log File Browser

You can download all log files stored on each device. By downloading the log files, you can view all log messages that were recorded in that log file outside of the portal web site. When you download a log file, it is saved as a plain text file. You can view the downloaded file in any plain text editor, such as Notepad.

To view and download log files, go to Analysis > Log File Browser.

Figure 31: Browsing log files in Analysis > Log File Browser

Device

 

 

 

Current Page

 

Device

The device that you are currently viewing log messages from.

Type

The type of log messages you are currently viewing. For example, if

 

 

Event Log is selected, all event log messages display.

Period:By default, Recent appears. Recent displays all current log messages Recent Specified that are occurring in real-time on the selected device.

Specified displays all historical log messages. When you select Specified, the fields From and To appear, with calendars. Select the calendar to specify the dates to view historical log messages on those dates.

Log Files

The name of the log file you are currently viewing. This name is in the

 

format: <log_name>_yyyymmdd-hhmm_yyyymmdd-hhmm.log.

 

For example, elog_20080915-1455_20080915-1508.log means that

 

this log file is an event log file and was created on September 15,

 

2008 at 2:55 pm and stopped on the same day at 3:08 pm.

Log Type

The type of log file you are currently viewing.

From

The date that the log file started collecting log messages.

To

The date that the log file stopped collecting log messages.

Size (bytes)

The size of the log file, in bytes.

Action

Download the log type to your management computer. You can only

 

view log files if they are downloaded to a computer.

Current Page

By default, the first page of the list of items is displayed. The total

 

number of pages displays after the current page number. For

 

example, if 3/54 appears, you are currently viewing page 3 of 54

 

pages.

 

To view pages, select the left and right arrows to display the first,

 

previous, next, or last page.

 

To view a specific page, enter the page number in the field and then

 

press Enter.

FortiGuard Analysis and Management Service Version 1.2.0 Administration Guide

13-12000-406-20081031

65

Page 63
Image 63
Fortinet 1.2.0 manual Log File Browser, Log Files, Log Type, From, Size bytes

1.2.0 specifications

Fortinet has consistently been at the forefront of cybersecurity solutions, and with the release of Fortinet 1.2.0, they have further solidified their commitment to providing robust and effective security solutions. This updated version integrates several advanced features and technologies designed to address the evolving threat landscape faced by organizations today.

One of the main highlights of Fortinet 1.2.0 is its enhanced security capabilities. The new version incorporates advanced threat intelligence powered by FortiGuard Labs, which allows for real-time detection of emerging threats. This integration ensures that organizations can proactively respond to potential security breaches, minimizing the impact on their operations.

Another key characteristic of Fortinet 1.2.0 is its improved performance metrics. With optimized processing algorithms and updated hardware support, the solution can handle increased traffic loads without compromising performance. This is particularly vital as businesses expand their digital footprint and require solutions that can scale effectively without lag.

Fortinet 1.2.0 also emphasizes automation and orchestration in cybersecurity processes. With its new Threat Response and Mitigation (TRM) feature, organizations can automate threat detection and response. This streamlines incident response workflows, allowing security teams to focus on more strategic initiatives rather than manual and time-consuming tasks.

Additionally, this version introduces enhanced integration capabilities with popular DevOps tools, facilitating seamless collaboration between security and development teams. This alignment is crucial in today’s fast-paced digital environment, where the speed of development needs to be balanced with security protocols.

Furthermore, Fortinet 1.2.0 offers improved user experience with a more intuitive interface and customizable dashboards. This allows security professionals to quickly access critical information and make informed decisions based on real-time data.

In summary, Fortinet 1.2.0 embodies a comprehensive approach to cybersecurity, combining advanced threat intelligence, enhanced performance, automation, integration with DevOps tools, and a user-friendly interface. As organizations continue to navigate dynamic digital challenges, Fortinet provides the necessary tools to safeguard their assets and ensure business continuity. With its robust feature set and innovative technologies, Fortinet 1.2.0 stands out as a pivotal solution in the cybersecurity landscape.