Fortinet 5.0 Patch 6 Microscope & Magnifier User Manual


 
FortinetFortinet 10 FortiWeb 5.0 Patch 6 Administration Guide
Logging................................................................................................................ 542
About logs & logging...................................................................................... 543
Log types ................................................................................................. 543
Log severity levels.................................................................................... 544
Log rate limits .......................................................................................... 544
Configuring logging........................................................................................ 545
Enabling log types, packet payload retention, & resource shortage alerts ....
546
Configuring log destinations .................................................................... 549
Obscuring sensitive data in the logs........................................................ 552
Configuring Syslog settings..................................................................... 554
Configuring FortiAnalyzer policies ........................................................... 555
Configuring triggers ................................................................................. 557
Viewing log messages ................................................................................... 557
Viewing a single log message as a table ................................................. 562
Viewing packet payloads ......................................................................... 563
Switching between Raw & Formatted log views...................................... 564
Displaying & arranging log columns......................................................... 566
Filtering log messages ............................................................................. 567
Downloading log messages..................................................................... 569
Deleting log files....................................................................................... 571
Coalescing similar attack log messages.................................................. 572
Searching attack logs .............................................................................. 573
Alert email ............................................................................................................ 576
Configuring email settings ............................................................................. 576
Configuring alert email for event logs ............................................................ 578
SNMP traps & queries ......................................................................................... 580
Configuring an SNMP community ................................................................. 581
MIB support ................................................................................................... 586
Reports ................................................................................................................ 586
Customizing the report’s headers, footers, & logo ........................................ 589
Restricting the report’s scope ....................................................................... 590
Choosing the type & format of a report profile .............................................. 592
Scheduling reports......................................................................................... 595
Selecting the report’s file type & email delivery............................................. 595
Viewing & downloading generated reports.................................................... 597
Data analytics ................................................................................................ 598
Configuring policies to gather data.......................................................... 598
Updating data analytics definitions.......................................................... 598
Viewing web site statistics....................................................................... 599
Filtering the data analytics report....................................................... 603
Bot analysis.................................................................................................... 605
Monitoring currently blocked IPs......................................................................... 606
FortiGuard updates.............................................................................................. 606
Vulnerability scans............................................................................................... 607