
Reports | Vulnerability reports |
|
|
Figure 36: VPN activity report in PDF
Vulnerability reports
Vulnerability reports show any potential weaknesses to attacks that may exist for selected devices by displaying the available ports on a FortiGate device. Rather than using the device logs for this report, the FortiLog unit queries for open ports and where possible and gathers information about the services running. Any known vulnerabilities that exist for the specific service or version of the service, are included in the reports.
Creating and generating a report
To generate a vulnerability report, begin by creating and saving a report configuration. You can use this report configuration for a scheduled report or for generating reports on demand.
To create a report
1Go to Reports > Config > Vulnerability.
2Select New and enter a name for the report.
FortiLog Administration Guide | 67 |