Fortinet FortiLog-800, FortiLog-100 manual Vulnerability reports, Creating and generating a report

Models: FortiLog-100 FortiLog-400 FortiLog-800

1 124
Download 124 pages 26.49 Kb
Page 67
Image 67

Reports

Vulnerability reports

 

 

Figure 36: VPN activity report in PDF

Vulnerability reports

Vulnerability reports show any potential weaknesses to attacks that may exist for selected devices by displaying the available ports on a FortiGate device. Rather than using the device logs for this report, the FortiLog unit queries for open ports and where possible and gathers information about the services running. Any known vulnerabilities that exist for the specific service or version of the service, are included in the reports.

Creating and generating a report

To generate a vulnerability report, begin by creating and saving a report configuration. You can use this report configuration for a scheduled report or for generating reports on demand.

To create a report

1Go to Reports > Config > Vulnerability.

2Select New and enter a name for the report.

FortiLog Administration Guide

05-16000-0082-20050115

67

Page 67
Image 67
Fortinet FortiLog-800, FortiLog-100, FortiLog-400 manual Vulnerability reports, Creating and generating a report