Contents
FortiLog Administration Guide 05-16000-0082-20050115 5
Reports ................................................................................................................. 57
Creating and generating a report........................................................................... ........... 57
Configuring report parameters....................................................... ............................... 58
Configuring a report query.......................... .................................................................. 59
Creating a query profile............................................................................................. 60
Selecting the devices for the report .............................................................................. 60
Creating a device profile............ ............................................................................... 61
Select filtering options.................................................................................... ............... 61
Creating a filter profile................................................................... ............................ 62
Setting a report schedule...................................................... ........................................ 62
Creating a report schedule profile........................................................... .................. 63
Choosing the report destination and format.................................................................. 63
Creating a report destination and format profile........................................................ 64
Reports on demand ...................................................................................................... 64
Viewing reports........................................... ...................................................................... 65
Roll up report ................................................................................................................ 66
Individual reports........................................................................................................... 66
Vulnerability reports........................................ .................................................................. 67
Creating and generating a report...................................................... ............................ 67
Selecting report result parameters................................................................................ 68
Selecting plug-ins.......................................................................................................... 68
Creating a plug-in profile............................................................................ ............... 69
Selecting the scan targets for the report........................................... ............................ 69
Creating a scan target profile............................................................... ..................... 70
Choosing the report destination and format.................................................................. 71
Creating a report destination and format profile........................................................ 71
Viewing the vulnerability report................................................... .................................. 72
Using Logs ........................................................................................................... 73
The Log view interface................................................................................................. ..... 74
Viewing logs.............................................................................................................. ........ 74
Finding log information.................................................................................................. 75
Importing log files.............................................................................................................. 77
Log Search........................................................................................................................ 78
Log watch (Active mode)...... ............................................................................................ 78
Event correlation (Active mode)........................................................................................ 79
Using the FortiLog unit as a NAS....................................................................... 81
Connecting to the FortiLog file system.............................................................................. 81
Providing access to the FortiLog hard disk............................................................ ........... 82
Selecting a file sharing protocol..................................................... ............................... 82
Adding and modifying user accounts.................................................... ........................ 82