Fortinet 572 FortiWeb 5.0 Patch 6 Administration Guide
2. Click Log Management.
A page appears, listing each of the log files for that type that are stored on the local hard
drive.
3. Either:
•To delete all log files, mark the check box in the column heading. All rows’ check boxes
will become marked.
•To delete some log files, mark the check box next to each file that you want to delete.
4. Click Clear Log.
Coalescing similar attack log messages
When viewing attack log messages, especially if there are many attacks of the same kind, to the
same URL, or to the same web host, you may find it easier to view unique log messages when
common ones are coalesced by one of those similarities, rather than by exact sequential order.
(In the web UI, this feature is called log message aggregation.)
For example, a worm outbreak on the Internet can create hundreds if not thousands of
malicious connections to your web servers. This could swamp your attack log with alerts,
obscuring other dangerous problems. By aggregating similar alerts — such as by the Sub Typ e
or Source IP column — you will not miss other problems.
To coalesce similar attack log messages
1. Go to Log&Report > Log Access > Attack.
To access this part of the web UI, your administrator’s account access profile must have
Read and Write permission to items in the Log & Report category. For details, see
“Permissions” on page 47.
2. On the tool bar, click the Log Message Aggregation icon.
A dialog appears.
3. In Available fields, select which aspect you want to use when grouping the log messages,
then click the right arrow to move it to the Aggregate log by these fields area.