Fortinet 587 FortiWeb 5.0 Patch 6 Administration Guide
When generating a log-based or scan-based report, FortiWeb appliances collate information
collected from log files and scan results, and present the information in tabular and graphical
format.
Before it can generate a report, in addition to log files and scan results, FortiWeb appliances
require a report profile in order to generate a report. A report profile is a group of settings that
contains the report name, file format, subject matter, and other aspects that the FortiWeb
appliance considers when generating the report.
FortiWeb appliances can generate reports automatically, according to the schedule that you
configure in the report profile, or manually, when you click the Run now icon in the report profile
list.
To configure a report profile
1. Before you generate a report, collect log data and/or vulnerability scan data that will be the
basis of the report. For information on enabling logging to the local hard disk, see
“Configuring logging” on page 545 and “Vulnerability scans” on page 505.
2. Go to Log&Report > Report Config > Report Config.
To access this part of the web UI, your administrator’s account access profile must have
Read and Write permission to items in the Log & Report category. For details, see
“Permissions” on page 47.
3. Click Create New.
A dialog appears.
4. In Report Name, type the name of the report as it will be referenced in the configuration. The
name cannot contain spaces.
Generating reports can be resource intensive. To avoid traffic processing performance impacts,
you may want to generate reports during times with low traffic volume, such as at night or
weekends. For more information on scheduling the generation of reports, see “Scheduling
reports” on page 595. To determine the current traffic volume, see “Real Time Monitor widget”
on page 537.
Consider sending reports to your web developers to provide feedback. If your organization
develops web applications in-house, this can be a useful way to quickly provide them
information on how to improve the security of the application.