FortinetFortinet 10 FortiWeb 5.0 Patch 6 Administration Guide
Logging................................................................................................................ 542
About logs & logging...................................................................................... 543
Log types................................................................................................. 543
Log severity levels.................................................................................... 544
Log rate limits .......................................................................................... 544
Configuring logging........................................................................................ 545
Enabling log types, packet payload retention, & resource shortage alerts ....
546
Configuring log destinations.................................................................... 549
Obscuring sensitive data in the logs........................................................ 552
Configuring Syslog settings..................................................................... 554
Configuring FortiAnalyzer policies ........................................................... 555
Configuring triggers ................................................................................. 557
Viewing log messages ................................................................................... 557
Viewing a single log message as a table ................................................. 562
Viewing packet payloads......................................................................... 563
Switching between Raw & Formatted log views...................................... 564
Displaying & arranging log columns......................................................... 566
Filtering log messages............................................................................. 567
Downloading log messages..................................................................... 569
Deleting log files....................................................................................... 571
Coalescing similar attack log messages.................................................. 572
Searching attack logs .............................................................................. 573
Alert email............................................................................................................ 576
Configuring email settings............................................................................. 576
Configuring alert email for event logs............................................................ 578
SNMP traps & queries ......................................................................................... 580
Configuring an SNMP community................................................................. 581
MIB support................................................................................................... 586
Reports................................................................................................................ 586
Customizing the report’s headers, footers, & logo........................................ 589
Restricting the report’s scope ....................................................................... 590
Choosing the type & format of a report profile.............................................. 592
Scheduling reports......................................................................................... 595
Selecting the report’s file type & email delivery............................................. 595
Viewing & downloading generated reports.................................................... 597
Data analytics ................................................................................................ 598
Configuring policies to gather data.......................................................... 598
Updating data analytics definitions.......................................................... 598
Viewing web site statistics....................................................................... 599
Filtering the data analytics report....................................................... 603
Bot analysis.................................................................................................... 605
Monitoring currently blocked IPs......................................................................... 606
FortiGuard updates.............................................................................................. 606
Vulnerability scans............................................................................................... 607