Manual de Usuario y Operación FortiAnalyzer
Manual de Usuario y Operación FortiAnalyzer
FortiAnalyzer 7.6.0
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change Log 12
Setting up FortiAnalyzer 13
Connecting to the GUI 13
FortiAnalyzer Setup wizard 14
Activating VM licenses 20
Security considerations 22
Restricting GUI access by trusted host 22
Trusted platform module support 22
Self-encrypting drives 24
Other security considerations 27
GUI overview 27
Panes 30
Color themes 30
Switching between ADOMs 31
Using the right-click menu 31
Using the CLI console 32
Avatars 33
Using the Process Monitor 33
Showing and hiding passwords 34
Google Map integration 35
Target audience and access level 35
Initial setup 35
FortiManager features 36
Next steps 36
Restarting and shutting down 36
FortiAnalyzer Key Concepts 37
Operation modes 37
Analyzer mode 37
Collector mode 38
Analyzer and Collector feature comparison 38
Analyzer–Collector collaboration 39
FortiAnalyzer Fabric 39
Administrative domains 39
Logs 40
Log encryption 40
Log storage 40
Log rolling 41
Log deletion 41
SQL database 41
Analytics and Archive logs 42
Data policy and automatic deletion 43
Disk utilization for Archive and Analytic logs 43
FortiView dashboard 43
Change Log
2024-08-30 Updated Using FortiAI on page 281 and FortiAI tokens on page 285.
Added FortiAI example tasks on page 287.
2024-09-17 Updated IOT dashboard on page 69 and Email metrics dashboard on page 70.
2024-11-27 Updated FortiAI data privacy on page 284 and Privacy Masking on page 426.
This chapter provides information about performing some basic setups for your FortiAnalyzer units.
This section contains the following topics:
l Connecting to the GUI on page 13
l Security considerations on page 22
l GUI overview on page 27
l Target audience and access level on page 35
l Initial setup on page 35
l FortiManager features on page 36
l Next steps on page 36
l Restarting and shutting down on page 36
The FortiAnalyzer unit can be configured and managed using the GUI or the CLI. This section will step you through
connecting to the unit via the GUI.
If you are connecting to the GUI for a FortiAnalyzer virtual machine (VM) for the first time, you
are required to activate a license. See Activating VM licenses on page 20.
If the network interfaces have been configured differently during installation, the URL
and/or permitted administrative access protocols (such as HTTPS) may no longer be in
their default state.
For information on enabling administrative access protocols and configuring IP addresses, see Configuring network
interfaces on page 344.
If the URL is correct and you still cannot access the GUI, you may also need to configure static
routes. For details, see Static routes on page 346.
After logging in for the first time, you should create an administrator account for yourself and assign the Super_User
profile to it. Then you should log into the FortiAnalyzer unit by using the new administrator account. See Managing
administrator accounts on page 414 for information.
When you log in to FortiAnalyzer, the FortiAnalyzer Setup wizard is displayed to help you set up FortiAnalyzer by
performing the following actions:
l Registering with FortiCare and enabling FortiCare single sign-on
l Specifying the hostname
l Changing your password
l Upgrading firmware (when applicable)
You can choose whether to complete the wizard now or later.
The FortiAnalyzer Setup wizard requires that you complete the Register with FortiCare step
before you can access the FortiAnalyzer appliance or VM.
When actions are complete, a green checkmark displays beside them in the wizard, and the wizard no longer displays
after you log in to FortiAnalyzer.
1. Log in to FortiAnalyzer.
The FortiAnalyzer Setup dialog box is displayed.
2. Click Begin to start the setup process now.
Alternately, click Later to postpone the setup tasks. Some tasks cannot be postponed.
3. When prompted, register with FortiCare and enable FortiCare single sign-on. You must complete the Register with
FortiCare step before you can access the FortiAnalyzer appliance or VM.
When using FortiAnalyzer in an air-gapped environment, you must manually import your
Entitlement File. See Licensing in an air-gap environment on page 408.
a. Automatic System Backup is enabled by default. Configure the following to specify your backup settings, or
disable automatic backups.
l In Backup Configuration File to, configure where the backup file will be sent.
l In Backup Frequency, select when the day(s) and time for the backup to be performed.
l In Encryption, set an encryption password.
10. Complete the setup by clicking Finish.
Activating VM licenses
If you are logging in to a FortiAnalyzer VM for the first time by using the GUI, you are required to activate a purchased
license or activate a trial license for the VM.
1. On the management computer, start a supported web browser and browse to https://<ip address> for the
FortiAnalyzer VM.
The login dialog box is displayed.
Action Description
Free Trial If a valid license is not associated with the account, you can start a free trial license.
1. Select Free Trial, and click Login with FortiCloud.
2. Use your FortiCloud account credentials to log in, or create a new account.
FortiAnalyzer connects to FortiCloud to get the trial license. The system will restart to
apply the trial license.
3. Read and accept the license agreement.
For more information, see the FortiAnalyzer VM Trial License Guide.
Upload License 1. Click Browse to upload the license file, or drag it onto the field.
2. Click Upload. After the license file is uploaded, the system will restart to verify it. This
may take a few moments.
Security considerations
You can take steps to prevent unauthorized access and restrict access to the GUI. This section includes the following
information:
l Restricting GUI access by trusted host on page 22
l Trusted platform module support on page 22
l Self-encrypting drives on page 24
l Other security considerations on page 27
To prevent unauthorized access to the GUI you can configure administrator accounts with trusted hosts. With trusted
hosts configured, the administrator user can only log into the GUI when working on a computer with the trusted host as
defined in the administrator account. You can configure up to ten trusted hosts per administrator account. See
Administrators on page 413 for more details.
On supported FortiAnalyzer hardware devices, the Trusted Platform Module (TPM) can be used to protect your
password and key against malicious software and phishing attacks. The dedicated module hardens the FortiAnalyzer by
generating, storing, and authenticating cryptographic keys.
For more information about which models feature TPM support, see the FortiAnalyzer Data Sheet.
By default, the TPM is disabled. To enable it, you must enable private-data-encryption and set the 32
hexadecimal digit master-encryption-password. This encrypts sensitive data on the FortiAnalyzer using AES128-CBC.
With the password, TPM generates a 2048-bit primary key to secure the master-encryption-password through RSA-
2048 encryption. The master-encryption-password protects the data. The primary key protects the master-encryption-
password.
The key is never displayed in the configuration file or the system CLI, thereby obscuring the information and leaving the
encrypted information in the TPM.
The TPM module does not encrypt the disk drive of eligible FortiAnalyzer.
The primary key binds the encrypted configuration file to a specific FortiAnalyzer unit and never leaves the TPM. When
backing up the configuration, the TPM uses the key to encrypt the master-encryption-password in the configuration file.
When restoring a configuration that includes a TPM protected master-encryption-password:
l If TPM is disabled, then the configuration cannot be restored.
l If TPM is enabled but has a different master-encryption-password than the configuration file, then the configuration
cannot be restored.
l If TPM is enabled and the master-encryption-password is the same in the configuration file, then the configuration
can be restored.
For information on backing up and restoring the configuration, see Backing up the system on page 53 and Restoring the
configuration on page 56.
The master-encryption-password is also required when migrating the configuration, regardless if TPM is available on the
other FortiAnalyzer model. For more information, see Migrating the configuration on page 57.
Passwords and keys that can be encrypted by the master-encryption-key include:
l Admin password
l Alert email user's password
l BGP and other routing related configurations
l External resource
l FortiGuard proxy password
l FortiToken/FortiToken Mobile’s seed
l HA password
l IPsec pre-shared key
l Link Monitor, server side password
l Local certificate's private key
l Local, LDAP. RADIUS, FSSO, and other user category related passwords
l Modem/PPPoE
l NST password
l NTP Password
l SDN connector, server side password
l SNMP
l Wireless Security related password
In HA configurations, each cluster member must use the same master-encryption-key so that
the HA cluster can form and its members can synchronize their configurations.
The output in the CLI includes ### TPM info, which displays if the TPM is detected (enabled), not detected (disabled),
or not available.
Self-encrypting drives
Auto-lock feature
To protect the disk's contents, assign the SED encryption key after RAID has been setup. The disk's contents are
protected if plugged into a system unless the encryption key is known and the system supports a similar RAID controller.
1. After RAID setup, enter the following command in the FortiAnalyzer CLI:
diagnose system disk sed {sed-key}
The key requires 8-32 characters, and it must include upper case, lower case, number, and special character
(excluding '\).
If a foreign SED disk is installed, this disk will be unavailable due to auto-lock feature.
Cryptographic erase
To quickly and securely dispose of disks, you can format the drives from the CLI and then use the auto-lock feature.
Examples
If there are non-SED disks, they are displayed in the output. For example:
diagnose system raid status
Storcli RAID:
RAID Level: Raid-50
RAID Status: OK
RAID Size: 52156GB
File System: ext4 51337GB
SED Encryption: Disabled
Groups: 2
Variable Description
sed-key SED encryption key. 8-32 chars, must include upper case, lower case, number
and special chars (exclude '\).
You can replace disks that supports SED feature, regardless of brand, however it's optimal to use the same specification
of hard drive in the existing array. The new disk will be automatically rebuilt by the system and it will have the same SED
key used by the existing system. This will be transparent for the user.
If an SED-enabled RAID failure occurs, formatting the drives will effectively clear the SED key. Thus, the user can assign
an SED key. For example, see below.
FMG-410G # diagnose system raid status
Storcli RAID:
RAID Level: Raid-50
RAID Status: Failed
RAID Size: 22353GB
File System: ext4 22001GB
SED Encryption: Enabled
Groups: 2
Resetting ...
In situations where SED-enabled disks need to be moved (re-homed) to a new physical chassis, the process will require
additional steps. See below.
1. On the target unit, install the same build as the source unit. Install SED capable drives and setup the RAID similar to
that of the source unit, and then enable SED using the same key as that of the source unit.
2. Shutdown both units and remove the drives from their respective chassis.
3. Move the source drives and install them to the target chassis.
Other security consideration for restricting access to the FortiAnalyzer GUI include the following:
l Configure administrator accounts using a complex passphrase for local accounts
l Configure administrator accounts using RADIUS, LDAP, TACACS+, or PKI
l Configure the administrator profile to only allow read/write permission as required and restrict access using read-
only or no permission to settings which are not applicable to that administrator
l Configure the administrator account to only allow access to specific ADOMs as required
When setting up FortiAnalyzer for the first time or after a factory reset, the password cannot be
left blank. You are required to set a password when the admin user tries to log in to
FortiManager from GUI or CLI for the first time. This is applicable to a hardware device as well
as a VM. This is to ensure that administrators do not forget to set a password when setting up
FortiAnalyzer for the first time.
After the initial setup, you can set a blank password from System Settings > Administrators.
GUI overview
When you log into the FortiAnalyzer GUI, the Dashboard pane is displayed. The Dashboard contains widgets that
provide performance and status information. For more information about the Dashboard, see Dashboards on page 45
Use the navigation menu on the left to open another pane. The available panes vary depending on the privileges of the
current user.
Device Manager Add and manage devices and VDOMs. See Device Manager on page 73.
Log View View logs for managed devices. You can display, download, import, and delete
logs on this page. You can also define custom views and create log groups. See
Log View and Log Quota Management on page 133.
Fabric View
Incidents & Events Configure and view events for logging devices. See Incidents & Events on page
180.
Configure fabric connectors and playbook automation. Playbook automation
requires a FortiSoC subscription service. See Automation on page 249.
This pane is not available when the unit is in Collector mode.
Reports Generate reports. You can also configure report templates, schedules, and output
profiles, and manage charts and datasets. See Reports on page 300.
This pane is not available when the unit is in Collector mode.
Management Extensions Enable and use management extension applications that are released and signed
by Fortinet. See Management Extensions on page 468.
System Settings Configure system settings such as network interfaces, administrators, system
time, server settings, and others. You can also perform maintenance and
firmware operations. See System Settings on page 343.
ADOM If ADOMs are enabled, the required ADOM can be selected from the dropdown
list.
The ADOMs available from the ADOM menu will vary depending on the privileges
of the current user.
CLI Console Open the CLI console to configure the FortiAnalyzer unit using CLI commands
directly from the GUI, without making a separate SSH, or local console
connection to access the CLI.
For more information, see Using the CLI console on page 32.
Note: The CLI Console requires that your web browser support JavaScript.
Online Help Click to open the FortiAnalyzer online help dropdown which contains the following
options:
FortiCare Debug Runs the execute tac report CLI command and
Report downloads a local copy of the report.
Notifications Click to display a list of notifications. Select a notification from the list to take
action on the issue.
FortiAI assistant Open the FortiAI Assistant pane. This feature requires a license.
For more information, see FortiAI on page 280.
Panes
In general, each pane four primary parts: the banner, toolbar, tree menu, and content pane.
Content pane Contains widgets, lists, configuration options, or other information, depending on
the pane, menu, or options that are selected. Most management tasks are
handled in the content pane.
Color themes
You can choose a color theme for the FortiAnalyzer GUI. For example, you can choose a color or image such as jade,
summer, or autumn.
By default, all users are assigned the global color theme. To change the global color theme, see Global administration
settings on page 443.
1. In the banner, open the dropdown for your account and click Change Profile.
The Change Profile dialog displays.
When ADOMs are enabled, you can move between ADOMs by selecting an ADOM from the ADOM button in the banner.
You are also prompted to select an ADOM when you log in.
ADOM access is controlled by administrator accounts and the profile assigned to the administrator account. Depending
on your account privileges, you might not have access to all ADOMs. See Managing administrator accounts on page 414
for more information.
To switch ADOMs:
Options are sometimes available using the right-click menu. Right-click an item in the content pane to display the menu
of available options. This menu often includes actions available in the toolbar, as well as some unique actions depending
on the pane and its content.
In the following example on the Reports pane, you can right-click a report, and select Edit, Clone, Delete, and more.
The CLI console is a terminal window that enables you to configure the FortiAnalyzer unit using CLI commands directly
from the GUI, without making a separate SSH, or local console connection to access the CLI.
When using the CLI console, you are logged in with the same administrator account that you used to access the GUI.
You can enter commands by typing them, or you can copy and paste commands into or out of the console.
For more information about using the CLI, see the FortiAnalyzer CLI Reference on the Fortinet Documents Library.
The CLI Console requires that your web browser support JavaScript.
To open the CLI console in the GUI, click the CLI Console icon (>_) in the banner.
You can perform the following actions from the top of the CLI Console:
Option Description
Record CLI Commands Begin recording the next commands entered in the console; click again to finish
recording. The commands and outputs from the recording are copied to the
clipboard.
Reconnect Console Reconnect to the console, clearing the previous text in the console and returning
to the initial prompt.
Run CLI Script Drag and drop or select a script file to run in the CLI.
Option Description
CLI of Current Page (if Go to the commands for the current page of the GUI, if they are available.
available)
Full screen Expand the console to full screen within the GUI.
Avatars
When FortiClient sends logs to FortiAnalyzer, an avatar for each user can be displayed in the Source column in the
FortiView and Log View panes. FortiAnalyzer can display an avatar when FortiClient is managed by FortiGate or
FortiClient EMS with logging to FortiAnalyzer enabled.
l When FortiClient Telemetry connects to FortiGate, FortiClient sends logs (including avatars) to FortiGate, and the
logs display in FortiAnalyzer under the FortiGate device as a sub-type of security.
The avatar is synchronized from FortiGate to FortiAnalyzer by using the FortiOS REST API.
l When FortiClient Telemetry connects to FortiClient EMS, FortiClient sends logs (including avatars) directly to
FortiAnalyzer, and logs display in a FortiClient ADOM.
If FortiAnalyzer cannot find the defined picture, a generic, gray avatar is displayed.
You can also optionally define an avatar for FortiAnalyzer administrators. See
Creating administrators on page 415.
The Process Monitor displays running processes with their CPU and memory usage as well as their disk I/O levels.
Administrators can sort, filter, and terminate processes within the Process Monitor pane.
In some fields, you can show and hide information by clicking the toggle icon.
For example, see the image of the Change Password dialog below. In this example, the Old Password is toggled to show
the password. The other fields are toggled to hide the password.
FortiAnalyzer integrates with Google Maps to provide map data for features including but not limited to the following:
l Device location in the Device Manager map view
l FortiView Monitors
Google Maps integration requires the following access. If this access is not available, map data will not be visible on
FortiAnalyzer.
l FortiAnalyzer must have access to https://mapserver.fortinet.com to register and retrieve the Google
Map license.
l The administrator PC must have an internet connection and be able to access to the following sites in order for the
browser to be able to download and display the Google Maps and overlay:
l https://maps.google.com
l https://maps.googleapis.com
l https://fonts.googleapis.com
l https://mapserver.fortinet.com
This guide is intended for administrators with full privileges, who can access all panes in the FortiAnalyzer GUI, including
the System Settings pane.
In FortiAnalyzer, administrator privileges are controlled by administrator profiles. Administrators who are assigned
profiles with limited privileges might be unable to view some panes in the GUI and might be unable to perform some
tasks described in this guide. For more information about administrator profiles, see Administrator profiles on page 423.
If you logged in by using the admin administrator account, you have the Super_User
administrator profile, which is assigned to the admin account by default and gives the admin
administrator full privileges.
Initial setup
This topic provides an overview of the tasks that you need to do to get your FortiAnalyzer unit up and running.
To set up FortiAnalyzer:
Once the IP address of the administrative port of FortiAnalyzer is changed, you will lose
connection to FortiAnalyzer. You will have to reconfigure the IP address of the
management computer to connect again to FortiAnalyzer and continue.
After you configure the administrator accounts for the FortiAnalyzer unit, you should log in
again by using your new administrator account.
6. Add devices to the FortiAnalyzer unit so that the devices can send logs to the FortiAnalyzer unit. See Adding
devices on page 77.
7. Configure the operation mode. See Configuring the operation mode on page 58 and Operation modes on page 37.
FortiManager features
If FortiManager features are enabled in FortiAnalyzer before upgrading to 6.2.0 and later, the
existing feature configurations will continue to be available after the upgrade.
FortiManager features carried over during an upgrade can be disabled through the CLI
console.
Next steps
Now that you have set up your FortiAnalyzer units and they have started receiving logs from the devices, you can start
monitoring and interpreting data. You can:
l View log messages collected by the FortiAnalyzer unit in Log View. See Types of logs collected for each device on
page 133.
l View multiple panes of network activity in FortiView > Monitors. See Monitors on page 112.
l View summaries of threats, traffic, and more in FortiView . See FortiView on page 90.
l Generate and view events in Incidents & Events. See Incidents & Events on page 180
l Generate and view reports in Reports. See Reports on page 300.
Always use the operation options in the GUI or the CLI commands to reboot and shut down the FortiAnalyzer system to
avoid potential configuration problems.
See Restart, shut down, or reset FortiAnalyzer on page 68 in System Settings on page 343.
This section provides information about basic FortiAnalyzer concepts and terms. If you are new to FortiAnalyzer, use this
section to quickly understand this document and the FortiAnalyzer platform.
This section includes the following sections:
l Operation modes on page 37
l Administrative domains on page 39
l Logs on page 40
l Log storage on page 40
l FortiView dashboard on page 43
Operation modes
FortiAnalyzer can run in two operation modes: Analyzer and Collector. Choose the operation mode for your
FortiAnalyzer units based on your network topology and requirements.
Analyzer mode
Analyzer mode is the default mode that supports all FortiAnalyzer features. Use this mode to aggregate logs from one or
more Collectors.
Collector mode
When FortiAnalyzer is in Collector mode, its primary task is forwarding logs of the connected devices to an Analyzer and
archiving the logs. Instead of writing logs to the database, the Collector retains logs in their original binary format for
uploading. In this mode, most features are disabled.
FortiView Yes No
Reporting Yes No
Analyzer–Collector collaboration
You can deploy Analyzer mode and Collector mode on different FortiAnalyzer units and make the units work together to
improve the overall performance of log receiving, analysis, and reporting. The Analyzer offloads the log receiving task to
the Collector so that the Analyzer can focus on data analysis and report generation. This maximizes the Collector’s log
receiving performance.
For an example of setting up Analyzer–Collector collaboration, see Collectors and Analyzers on page 465.
FortiAnalyzer Fabric
FortiAnalyzer can also join a FortiAnalyzer Fabric which enables centralized viewing of devices, incidents, and events
across multiple FortiAnalyzers acting as members.
The FortiAnalyzer Fabric is ideal for use in high volume environments with many FortiAnalyzers. For more information
about sizing and design considerations, see the FortiAnalyzer Architecture Guide.
In this mode, FortiAnalyzer Fabric members form a Fabric with one device operating in supervisor mode as the root
device. Incident, event, and log information is synced from members to the supervisor using the API.
See the FortiAnalyzer Fabric Deployment Guide for more information.
Administrative domains
Administrative domains (ADOMs) enable the admin administrator to constrain the access privileges of other
FortiAnalyzer unit administrators to a subset of devices in the device list. For Fortinet devices with virtual domains
(VDOMs), ADOMs can further restrict access to only data from a specific VDOM for a device.
Enabling ADOMs alters the available functions in the GUI and CLI. Access to the functions depends on whether you are
logged in as the admin administrator. If you are logged in as the admin administrator, you can access all ADOMs. If you
are not logged in as the admin administrator, the settings in your administrator account determines access to ADOMs.
For information on enabling and disabling ADOMs, see Enabling and disabling the ADOM feature on page 368. For
information on working with ADOMs, see Administrative Domains (ADOMs) on page 364. For information on configuring
administrator accounts, see Managing administrator accounts on page 414.
Logs
Log encryption
Beginning in FortiAnalyzer 6.2, all logs from Fortinet devices (using Fortinet's proprietary protocol: OFTP) must be
encrypted. FortiAnalyzer encryption level must be equal or less than the sending device’s level. For example, when
configuring logging from a FortiGate, FortiAnalyzer must have the same encryption level or lower than FortiGate in order
to accept logs from FortiGate.
See also Appendix B - Log Integrity and Secure Log Transfer on page 474.
Log storage
Logs and files are stored on the FortiAnalyzer disks. Logs are also temporarily stored in the SQL database.
You can configure data policy and disk utilization settings for devices. These are collectively called log storage settings.
You can configure global log and file storage settings. These apply to all logs and files in the FortiAnalyzer system
regardless of log storage settings.
Log rolling
When FortiAnalyzer receives a log, it is stored in a file. Logs will continue to populate this file until its limit is reached, at
which time the file is "rolled" which involves compressing the file and creating a new one for further logs of that type.
There are two settings that you can use to configure when log rolling occurs, and both may be used at the same time,
with rolling taking place when either condition is met.
l Log file size: This is enabled by default and set to 200 MB.
l At a scheduled time: Either daily or weekly at a set time.
Rolling the files daily is recommended to avoid a file from spanning more than 24 hours and masking the actual amount
of days you are storing logs for.
See also Configuring rolling and uploading of logs using the GUI on page 402.
Log deletion
When you reach your archive retention limit as defined by allocated storage size or specified days, FortiAnalyzer deletes
old logs to make room for new logs. FortiAnalyzer can only delete files, not logs within a file. Controlling file growth is
important because storage capacity is not infinite and it directly affects how old logs are deleted to make room for new
logs.
FortiAnalyzer will delete old files based on which condition is forcing the deletion:
l Days: Delete the log file that contains logs which are all outside the configured day retention period. Log files can
span several days, or even months. When this is the case, the file will not be considered eligible for deletion when
logs that are within the configured retention days would be deleted. This can lead to Archive indicating it is storing
more days than it is configured for (for example, 100/90 days). This is due to the number displaying the oldest log
date, and not specifically that it has logs for each day up to that number.
l Storage size: Delete the log file with the oldest last received log. This can lead to the administrator not seeing the
true amount of logs in analytics since there's no way to indicate that there are no logs for days 60 through 89, only
that there are some logs from 90 days ago.
See also Data policy and automatic deletion on page 43 and Disk utilization for Archive and Analytic logs on page 43.
SQL database
FortiAnalyzer supports Structured Query Language (SQL) for logging and reporting. The log data is inserted into the
SQL database to support data analysis in FortiView, Log View, and Reports. Remote SQL databases are not supported.
For more information, see FortiView on page 90, Types of logs collected for each device on page 133, and Reports on
page 300.
The log storage settings define how much FortiAnalyzer disk space to use for the SQL database.
When FortiAnalyzer is in Collector mode, the SQL database is disabled by default. If you want
to use logs that require SQL when FortiAnalyzer is in Collector mode, you must enable the
SQL database. See Operation modes on page 37.
Archive logs
When FortiAnalyzer receives a log, it is stored in a file. Logs will continue to populate this file until its limit is reached, at
which time the file is "rolled" which involves compressing the file and creating a new one for further logs of that type.
These files (rollled or otherwise) count against the archive retention limits and are referred to as Archived or Offline logs.
You cannot immediately view details about these logs in the FortiView, Log View, and Incidents & Events panes. You
also cannot generate reports about the logs in the Reports pane.
Archive logs are stored unchanged and can be uploaded to a file server for use as backups.
l If you are using a FortiAnalyzer-VM, you may also choose to snapshot the data drive to backup your logs.
l If you are using a physical FortiAnalyzer which leverages RAID for storage, remember that RAID is not a backup
solution.
Log storage in Archive is important since it is used to rebuild the database in the event of database corruption, or in some
cases during upgrades.
Analytic logs
Immediately following the storage of a log in an archive, the same log is inserted into the SQL database. This function is
also known as being indexed, and these logs are referred to as Analytic or Online logs.
Analytic logs are the only logs which are used for analysis in FortiAnalyzerLog View (excluding Log Browse), Incidents
and Events, and Reports.
Analytic logs are dissected during insertion and any subtypes are stored as their own category. For example, security
profile logs such as web filtering logs are sent and stored as Traffic logs when archived, however, Analytics extracts the
relevant web filtering fields and stores them in a web filtering table.
Indexed logs take up significantly more space than the same amount of logs in Archive.
Most administrators may need to store between 30 and 60 days in Analytics, however, this should be configured for the
amount of time that you would typically need to explore the logs for.
If you need to run analytics for dates outside your Analytics retention, you may perform a database rebuild and load the
particular date range. A database rebuild involves purging all logs from Analytics and loading logs for the days of interest
from Archive. Once analysis is complete, you can then rebuild once more to load the most current logs into analytics
from the archive.
Use a data policy to control how long to keep compressed and indexed logs. When ADOMs are enabled, you can specify
settings for each ADOM and the settings apply to all devices in that ADOM. When ADOMs are disabled, settings apply to
all managed devices.
A data policy specifies:
l How long to keep Analytics logs indexed in the database
When the specified length of time in the data policy expires, logs are automatically purged from the database but
remain compressed in a log file on the FortiAnalyzer disks.
l How long to keep Archive logs on the FortiAnalyzer disks
When the specified length of time in the data policy expires, Archive logs are deleted from the FortiAnalyzer disks.
See also Log storage information on page 155.
You can specify how much of the total available FortiAnalyzer disk space to use for log storage. You can specify what
ratio of the allotted storage space to use for logs that are indexed in the SQL database and for logs that are stored in a
compressed format on the FortiAnalyzer disks. Then you can monitor how quickly device logs are filling up the allotted
disk space.
Analytic logs indexed in the SQL database require more disk space than Archive logs (purged
from the SQL database but remain compressed on the FortiAnalyzer disks).
An average Analytic log is 600 bytes, and an average Archive log is 80 bytes. By default, after
seven days Analytic logs are compressed and are an average of 150 bytes.
Keep this difference in mind when specifying the storage ratio for Analytics and Archive logs.
When ADOMs are enabled, you can specify settings for each ADOM and the settings apply to all devices in that ADOM.
When ADOMs are disabled, settings apply to all managed devices. See Log storage information on page 155.
FortiView dashboard
FortiAnalyzer provides dashboards for Security Operations Center (SOC) administrators. FortiView includes monitors
which enhance visualization for real-time activities and historical trends for analysts to effectively monitor network
activities and security alerts. See FortiView on page 89.
In high capacity environments, the FortiView module can be disabled to improve performance. See Enabling and
disabling FortiView on page 131.
Dashboards
The Dashboards provide easy access to information, including the performance and status of the FortiAnalyzer, the
Internet-of-Things (IoT) devices on the network, email metrics, and security operations.
Status
Dashboards > Status contains widgets that provide performance and status information and enable you to configure
basic system settings.
Widget Description
System Information Displays basic information about the FortiAnalyzer system, such as up time and
firmware version. You can also enable or disable Administrative Domains and
adjust the operation mode. For more information, see System Information widget
on page 47.
From this widget you can manually update the FortiAnalyzer firmware to a
different release. For more information, see Updating the system firmware on
page 49.
The widget fields will vary based on how the FortiAnalyzer is configured, for
example, if ADOMs are enabled.
System Resources Displays the real-time and historical usage status of the CPU, memory and hard
disk. For more information, see System Resources widget on page 58.
Widget Description
License Information Displays whether the unit license is registered to FortiCloud, and if remote access
from FortiCloud is enabled.
Displays how many devices of the supported maximum are connected to the
FortiAnalyzer unit. See License Information widget on page 58.
From this widget you can purchase a license, add a license, or manually upload a
license for VM systems.
Unit Operation Displays status and connection information for the ports of the FortiAnalyzer unit.
It also enables you to shutdown and restart the FortiAnalyzer unit or reformat a
hard disk. For more information, see Unit Operation widget on page 64.
Alert Message Console Displays log-based alert messages for both the FortiAnalyzer unit and connected
devices. For more information, see Alert Messages Console widget on page 65.
Log Receive Monitor Displays a real-time monitor of logs received. You can view data per device or per
log type. For more information, see Log Receive Monitor widget on page 65.
Insert Rate vs Receive Rate Displays the log insert and receive rates. For more information, see Insert Rate vs
Receive Rate widget on page 66.
The Insert Rate vs Receive Rate widget is hidden when the FortiAnalyzer is
operating in Collector mode, and the SQL database is disabled.
Log Insert Lag Time Displays how many seconds the database is behind in processing the logs. For
more information, see Log Insert Lag Time widget on page 66.
The Log Insert Lag Time widget is hidden when the FortiAnalyzer is operating in
Collector mode, and the SQL database is disabled.
Receive Rate vs Forwarding Displays the Receive Rate, which is the rate at which FortiAnalyzer is receiving
Rate logs. When log forwarding is configured, the widget also displays the log
forwarding rate for each configured server. For more information, see Receive
Rate vs Forwarding Rate widget on page 67.
Disk I/O Displays the disk utilization, transaction rate, or throughput as a percentage over
time. For more information, see Disk I/O widget on page 67.
Device widgets For example, widgets such as Status, Disk Quota Usage, and Last Log Time.
These widgets display summary information for authorized devices.
For more inforamtion, see Device widgets on page 67.
The FortiAnalyzer Status dashboard can be customized. You can select which widgets to display, where they are
located on the page, and whether they are minimized or maximized. It can also be viewed in full screen by selecting the
full screen button on the far right side of the toolbar.
Action Steps
Move a widget Move the widget by clicking and dragging its title bar, then dropping it in its new location
Add a widget Select Toggle Widgets from the toolbar, then select the name widget you need to add.
Delete a widget Click the Close icon in the widget's title bar.
Customize a widget For widgets with an edit icon, you can customize the widget by clicking the Edit icon and
configuring the settings.
Reset the Select Toggle Widgets > Reset to Default from the toolbar. The dashboards will be reset to the
dashboard default view.
The information displayed in the System Information widget is dependent on the FortiAnalyzer model and device
settings. The following information is available on this widget:
Host Name The identifying name assigned to this FortiAnalyzer unit. Click the edit host name
button to change the host name. For more information, see Changing the host
name on page 48.
Serial Number The serial number of the FortiAnalyzer unit. The serial number is unique to the
FortiAnalyzer unit and does not change with firmware upgrades. The serial
number is used for identification when connecting to the FortiGuard server.
Platform Type Displays the FortiAnalyzer platform type, for example FAZVM64 (virtual
machine).
HA Status Displays if FortiAnalyzer unit is in High Availability mode and whether it is the
Primary or Secondary unit in the HA cluster.
System Time The current time on the FortiAnalyzer internal clock. Click the edit system time
button to change system time settings. For more information, see Configuring the
system time on page 48.
Firmware Version The version number and build number of the firmware installed on the
FortiAnalyzer unit.
You can access the latest firmware version available on FortiGuard from
FortiAnalyzer.
Alternately you can manually download the latest firmware from the Customer
Service & Support website at https://support.fortinet.com. Click the update button,
then select the firmware image to load from the local hard disk or network volume.
For more information, see Updating the system firmware on page 49.
System Configuration The date of the last system configuration backup. The following actions are
available:
l Click the backup button to backup the system configuration to a file; see
Backing up the system on page 53.
l Click the restore to restore the configuration from a backup file; see
Restoring the configuration on page 56. You can also migrate the
configuration to a different FortiAnalyzer model by using the CLI. See
Migrating the configuration on page 57.
Current Administrators The number of administrators currently logged in. Click the current session list
button to view the session details for all currently logged in administrators.
Up Time The duration of time the FortiAnalyzer unit has been running since it was last
started or restarted.
Administrative Domain Displays whether ADOMs are enabled. Toggle the switch to change the
Administrative Domain state. See Enabling and disabling the ADOM feature on
page 368.
Operation Mode Displays the current operation mode of the FortiAnalyzer. Click the other mode to
change to it. For more information on operation modes, see Operation modes on
page 37.
You can either manually set the FortiAnalyzer system time or configure the FortiAnalyzer unit to automatically keep its
system time correct by synchronizing with a Network Time Protocol (NTP) server.
For many features to work, including scheduling, logging, and SSL-dependent features, the
FortiAnalyzer system time must be accurate.
System Time The date and time according to the FortiAnalyzer unit’s clock at the time that
this pane was loaded or when you last clicked the Refresh button.
Time Zone Select the time zone in which the FortiAnalyzer unit is located and whether or
not the system automatically adjusts for daylight savings time.
Time zone settings can also be for each ADOM. See Creating ADOMs on
page 370.
Update Time By Select Set time to manually set the time, or Synchronize with NTP Server to
automatically synchronize the time.
Select Date Set the date from the calendar or by manually entering it in the format:
YYYY/MM/DD.
Synchronize with NTP Server Automatically synchronize the date and time.
Server Enter the IP address or domain name of an NTP server. Click the plus icon to
add more servers. To find an NTP server that you can use, go to
http://www.ntp.org.
To take advantage of the latest features and fixes, you can update FortiAnalyzer firmware. From the Dashboard menu in
FortiAnalyzer, you can access firmware images on FortiGuard and update FortiAnalyzer. Alternately you can manually
download the firmware image from the Customer Service & Support site, and then upload the image to FortiAnalyzer.
For information about upgrading your FortiAnalyzer device, see the FortiAnalyzer Upgrade Guide or contact Fortinet
Customer Service & Support.
Back up the configuration and database before changing the firmware of FortiAnalyzer.
Changing the firmware to an older or incompatible version may reset the configuration and
database to the default values for that firmware version, resulting in data loss. For information
on backing up the configuration, see Backing up the system on page 53.
Before you can download firmware updates for FortiAnalyzer, you must first register your
FortiAnalyzer unit with Customer Service & Support. For details, go to
https://support.fortinet.com/ or contact Customer Service & Support.
3. Before upgrading your firmware, you can choose to enable or disable Backup Configuration. When this setting is
enabled, you will automatically download a backup copy of your FortiAnalyzer configuration when performing a
firmware upgrade.
Type and confirm the password you want to use for encryption. The password can be a maximum of 63 characters.
4. From the FortiGuard Firmware box, select the version of FortiAnalyzer for the upgrade, and click OK.
The FortiGuard Firmware box displays the firmware images available for upgrade:
l When FortiAnalyzer has a valid contract, all available firmware versions are displayed for upgrading or
downgrading.
l When FortiAnalyzer has no valid contract, or the contract is expired, only display the available patch upgrades.
l A green checkmark displays beside the recommended image for FortiAnalyzer upgrade.
l If you select an image without a green checkmark, a confirmation dialog box is displayed. Click OK to continue.
.
l FortiAnalyzer downloads the firmware image from FortiGuard.
l FortiAnalyzer uses the downloaded image to update its firmware, and then restarts.
1. Download the firmware (the .out file) from the Customer Service & Support website, https://support.fortinet.com/.
2. Go to Dashboards > Status.
3. In the System Information widget, in the Firmware Version field, click Upgrade Firmware. The Firmware Upload
dialog box opens.
4. Before upgrading your firmware, you can choose to enable or disable Backup Configuration. When this setting is
enabled, you will automatically download a backup copy of your FortiAnalyzer configuration when performing a
firmware upgrade.
Type and confirm the password you want to use for encryption. The password can be a maximum of 63 characters.
5. Drag and drop the file onto the dialog box, or click Browse to locate the firmware package (.out file) that you
downloaded from the Customer Service & Support portal and then click Open.
6. Click OK. Your device will upload the firmware image and you will receive a confirmation message noting that the
upgrade was successful.
Optionally, you can upgrade firmware stored on an FTP or TFTP server using the following
CLI command:
execute restore image {ftp | tftp} <file path to server> <IP of
server> <username on server> <password>
For more information, see the FortiAnalyzer CLI Reference.
FortiAnalyzer 7.6.0 and later firmware images use tags to indicate the following maturity levels:
l The Feature tag indicates that the firmware release includes new features. It can also include bug fixes and
vulnerability patches where applicable.
l The Mature tag indicates that the firmware release includes no new, major features. Mature firmware will contain
bug fixes and vulnerability patches where applicable.
Administrators can use the tags to identify the maturity level of the current firmware in the GUI or CLI.
Administrators can view the maturity level of each firmware image that is available for upgrade on the Firmware
Management dialog box. When upgrading from mature firmware to feature firmware, a warning message is displayed.
In this example, the Version field includes .F to indicate that the maturity level is feature:
# get system status
Platform Type : FMG-3000G
Platform Full Name : FortiManager-3000G
Version : vx.x.x0-buildxxxx 240620 (GA.F)
In this example, the Version field includes .M to indicate that the maturity level is mature:
# get system status
Platform Type : FMG-3000G
Platform Full Name : FortiManager-3000G
Version : vx.x.x-buildxxxx 240620 (GA.M)
Fortinet recommends that you back up your FortiAnalyzer configuration to your management computer on a regular
basis to ensure that, should the system fail, you can quickly get the system back to its original state with minimal affect to
the network. You should also back up your configuration after making any changes to the FortiAnalyzer configuration or
settings that affect connected devices.
Fortinet recommends backing up all configuration settings from your FortiAnalyzer unit before upgrading the
FortiAnalyzer firmware. See Updating the system firmware on page 49.
An MD5 checksum is automatically generated in the event log when backing up the configuration. You can verify a
backup by comparing the checksum in the log entry with that of the backup file.
The character " \" is used in the FortiAnalyzer CLI as an escape character.
If your encryption password contains the \ character, you must either escape it (by adding
an additional \) or use single quotes around the password when referring to it in the CLI.
For example:
l execute backup all-settings ftp 10.0.0.1 backup/backup1.dat
You can configure FortiAnalyzer to automatically backup your configuration on a set schedule.
For example, the following configuration uses the FTP protocol to backup the configuration to server 172.20.120.11 in
the /usr/local/backup directory every Monday at 1:00pm.
config system backup all-settings
set status enable
set server 172.20.120.11
set user admin
set directory /usr/local/backup
set week_days monday
set time 13:00:00
set protocol ftp
end
For more information, see the FortiAnalyzer CLI Reference Guide on the Fortinet Documents Library.
After performing backups, you can view the backup history to see all backups performed on the FortiAnalyzer.
MD5 checksum
You can use secure copy protocol (SCP) with a SSH certificate to back up the FortiAnalyzer system configuration.
The following is an example of SSH certificate generation to be used with SCP for configuration backup. This example
uses RSA but can also be applied to ED25519 keys.
For more information on configuration of backup settings in the FortiAnalyzer CLI, see the FortiAnalyzer CLI Reference.
You can use the following procedure to restore your FortiAnalyzer configuration from a backup file on your management
computer.
box opens.
3. Configure the following settings then select OK.
Choose Backup File Select Browse to find the configuration backup file you want to restore, or drag
and drop the file onto the dialog box.
Overwrite current IP and Select the checkbox to overwrite the current IP and routing settings.
routing settings
Migrate from a different Enable this option to migrate the uploaded database from a different version or
platform platform. See Migrating the configuration on page 57.
l When this option is disabled, the default operation of FortiAnalyzer is to
You can back up the configuration of one FortiAnalyzer and then use the GUI or CLI to migrate the settings to another
FortiAnalyzer on the same or different platform or version.
If you encrypted the FortiAnalyzer configuration file when you created it, you need the password to decrypt the
configuration file when you migrate the file to another FortiAnalyzer model.
When migrating the database from another platform, all configurations except the system
settings are migrated. These system settings must be manually copied from the original
FortiAnalyzer model to the other FortiAnalyzer model.
4. If the configuration file is for multiple ADOMs, enable Administrative Domains in the System Information widget
before migrating.
5. Open the CLI Console, and enter the following command:
execute migrate all-settings <ftp | scp | sftp> <server> <filepath> <user> <password>
<cryptpasswd>
6. After migrating, update the system settings, as needed.
The FortiAnalyzer unit has two operation modes: Analyzer and Collector. For more information, see Operation modes on
page 37.
When FortiAnalyzer is operating in Collector mode, the SQL database is disabled by default so logs that require the SQL
database are not available in Collector mode unless the SQL database is enabled.
The System Resources widget displays the usage status of the CPUs, memory, and hard disk. You can view system
resource information in real-time or historical format, as well as average or individual CPU usage.
On VMs, warning messages are displayed if the amount of memory or the number of CPUs assigned are too low, or if the
allocated hard drive space is less than the licensed amount. These warnings are also shown in the notification list (see
GUI overview on page 27). Clicking on a warning opens the FortiAnalyzer VM Install Guide.
To toggle between real-time and historical data, click Edit in the widget toolbar, select Historical or Real-time, edit the
other settings as required, then click OK.
To view individual CPU usage, from the Real-Time display, click on the CPU chart. To go back to the standard view, click
the chart again.
The License Information widget displays the number of devices connected to the FortiAnalyzer.
FortiGuard
Outbreak Detection The license status. For more information, see Outbreak Alerts on page 271.
Service
Server Location The locations of the FortiGuard servers, either global or US only.
Click the edit icon to adjust the location. Changing the server location will cause
the FortiAnalyzer to reboot.
Logging
Device/VDOMs The total number of devices and VDOMs connected to the FortiAnalyzer and the
total number of device and VDOM licenses.
GB/Day The gigabytes per day of logs allowed and used for this FortiAnalyzer. Click the
show details button to view the GB per day of logs used for the previous 6 days.
FortiAnalyzer displays a warning after exceeding the quota for more than 7 days,
and it is recommended that you review your daily logging or upgrade your license
to accommodate the extra logs.
The GB/Day log volume can be viewed per ADOM through the CLI using:
diagnose fortilogd logvol-adom <name>.
Update Server
AntiVirus and IPS The IP address and physical location of the Antivirus and IPS update server.
Web and Email The IP address and physical location of the web and email filter update server.
Filter
FortiClient Update The IP address and physical location of the FortiClient update server.
Register your device with FortiCloud to receive customer services, such as firmware updates and customer support.
You cannot enable remote access from FortiCloud if the FortiAnalyzer is managed by a
FortiManager. You must disable the management before enabling remote access.
For a FortiAnalyzer high availability (HA) cluster, only the primary unit needs to register and enable remote access from
FortiCloud.
5. Click OK.
If you have purchased an add-on license and have a FortiCloud account, you can use the License Information widget to
activate an add-on license. You will need the contract registration code to activate the license.
After you enter the contract registration code for the license, FortiAnalyzer communicates with FortiCloud to activate the
license.
To add a license:
You can apply a VM subscription license (VM-S) on top of an existing FortiAnalyzer-VM license, allowing you to migrate
your FortiAnalyzer-VM (perpetual) to the VM-S (subscription) model. FortiAnalyzer will use the new license's serial
number and notify all connected FortiGate models of the change.
Alternatively, you can migrate an existing subscription license to a perpetual license using the same process.
To migrate a license:
1. Download your new subscription license file from FortiCare, which includes the new serial number.
2. In the FortiAnalyzer-VM CLI, run the following command:
execute migrate serial-number-list <new serial number>
After running the command, OFTP will automatically restart.
3. After a short wait, run the following command in the FortiAnalyzer CLI to ensure that each FortiGate is connected to
the FortiAnalyzer.
diagnose test application oftpd 3
4. Install the new license file through the FortiAnalyzer GUI.
FortiAnalyzer will automatically reboot once the license file has been added.
5. After the FortiAnalyzer reboots, use the following CLI commands on FortiAnalyzer to verify that FortiGate devices
are able to connect and send logs, and check that the new serial number and license information has been migrated
on FortiAnalyzer.
diagnose test application oftp 3
diagnose debug vminfo
get system status
The Unit Operation widget graphically displays the status of each port. The port name indicates its status by its color.
Green indicates the port is connected. Grey indicates there is no connection.
Hover the cursor over the ports to view a pop-up that displays the full name of the interface, the IP address and netmask,
the link status, the speed of the interface, and the amounts of sent and received data.
The Alert Message Console widget displays log-based alert messages for both the FortiAnalyzer unit itself and
connected devices.
Alert messages help you track system events on your FortiAnalyzer unit such as firmware changes, and network events
such as detected attacks. Each message shows the date and time the event occurred.
Click Edit from the widget toolbar to view the Alert Message Console Settings, where you can adjust the number of
entries that are visible in the widget, and the refresh interval.
To view a complete list of alert messages, click Show More from the widget toolbar. The widget will show the complete
list of alerts. To clear the list, click Delete All Messages. Click Show Less to return to the previous view.
The Log Receive Monitor widget displays the rate at which the FortiAnalyzer unit receives logs over time. Log data can
be displayed by either log type or device.
Hover the cursor over a point on the graph to see the exact number of logs that were received at a specific time. Click the
name of a device or log type to add or remove it from the graph. Click Edit in the widget toolbar to modify the widget's
settings.
The Insert Rate vs Receive Rate widget displays the log insert and log receive rates over time.
l Log receive rate: how many logs are being received.
l Log insert rate: how many logs are being actively inserted into the database.
If the log insert rate is higher than the log receive rate, then the database is rebuilding. The lag is the number of logs
waiting to be inserted.
Hover the cursor over a point on the graph to see the exact number of logs that were received and inserted at a specific
time. Click Receive Rate or Insert Rate to remove those data from the graph. Click the edit icon in the widget toolbar to
adjust the time interval shown on the graph and the refresh interval.
This widget is hidden when FortiAnalyzer is operating in Collector mode, and the SQL
database is disabled.
The Log Insert Lag Time widget displays how many seconds the database is behind in processing the logs.
Click the edit icon in the widget toolbar to adjust the time interval shown on the graph and the refresh interval (0 to
disable) of the widget.
This widget is hidden when FortiAnalyzer is operating in Collector mode, and the SQL
database is disabled.
The Receive Rate vs Forwarding Rate widget displays the rate at which the FortiAnalyzer is receiving logs. When log
forwarding is configured, the widget also displays the log forwarding rate for each configured server.
Click the edit icon in the widget toolbar to adjust the time period shown on the graph and the refresh interval, if any, of the
widget.
The Disk I/O widget shows the disk utilization (%), transaction rate (requests/s), or throughput (KB/s), versus time.
Click the edit icon in the widget toolbar to select which chart is displayed, the time period shown on the graph, and the
refresh interval (if any) of the chart.
Device widgets
The following widgets in Dashboards > Status provide a summary of the devices that are added and authorized in the
FortiAnalyzer. These widgets link to other panes in the GUI, which provide more detailed information.
Click one of the following widgets to open Device Manager. For more information, see Device Manager on page 73
l Log Status
l Disk Quota Usage
l Last Log Time
Always use the operation options in the GUI or the CLI commands to reboot and shut down the FortiAnalyzer system to
avoid potential configuration problems.
Restarting FortiAnalyzer
1. From the CLI, or in the CLI Console menu, enter the following command:
execute reboot
The system will be rebooted.
Do you want to continue? (y/n)
2. Enter y to continue. The FortiAnalyzer system will restart.
1. From the CLI, or in the CLI Console menu, enter the following command:
execute shutdown
The system will be halted.
Do you want to continue? (y/n)
2. Enter y to continue. The FortiAnalyzer system will shutdown.
1. From the CLI, or in the CLI Console menu, enter the following command:
execute reset {adom-settings | all-except ip | all-settings | all-shutdown}
Variable Description
adom-settings <adom> Reset an ADOM's settings.
<version> <mr> <ostype> l <adom>: The ADOM name.
all-except-ip Reset all settings except the current IP address and route information.
all-settings Reset to factory default settings.
all-shutdown Reset all settings and shutdown.
2. Enter y to continue. The device will reset settings based on the type of reset performed.
For example, execute reset all-settings will reset all FortiAnalyzer to factory defaults.
IOT dashboard
The IOT Dashboard displays information about Operation Technology (OT) and Internet of Things (IoT) devices.
License requirements:
l To display OT devices in this dashboard, the FortiAnalyzer and FortiGate devices must have OT Security Service
entitlements.
l To display IoT devices in this dashboard, the FortiGate devices must be licensed for the IoT Detection Service.
Use the time range dropdown to filter all widgets in the IOT Dashboard. After clicking Edit, you can select which widgets
should appear using the Toggle Widget dropdown. You can also resize and move widgets according to your preference.
Once the changes are complete, click Save to save the changes, or click Reset to reset to the default settings.
By default, the Total Devices and IoT Devices widgets display at the top of the dashboard. The following counts are
included in these widgets:
Count Description
Total Devices The total number of devices, including network devices, endpoints devices, and
IoT/OT devices.
New Devices The number of newly added devices in the selected time range.
Identified The number of devices that can be recognized using the existing device detection
method.
New IoT Devices The number of newly added IoT devices in the selected time range.
There are also seven other widgets providing further details about the OT/IoT devices:
Widget Description
Device Category A donut chart of the device categories for all devices.
The available device categories are listed on the FortiGuard website.
IoT Vendors A donut chart of the vendors that manufacture the IoT devices.
Vulnerabilities by Vendor A donut chart of vulnerabilities detected from the IoT devices grouped by the
device vendor.
New Devices Detected A line chart of all new devices detected over the selected time range by device
category.
Alerts Distribution A sankey chart that displays the number of alerts sorted by severity (Critical, High,
Medium), and then further sorted by device category.
Top IoT Devices with Lists the top 5 IoT devices by highest number of Critical and High vulnerabilities.
Vulnerabilities
IoT Devices with Internet Lists all IoT devices that have traffic going to the internet.
Connection
The Email Metrics dashboard correlates FortiMail logs and FortiGate logs to provide visibility for email traffic.
Use the time range dropdown and device dropdown to filter all widgets in the dashboard. You can customize which
widgets appear in the dashboard as well. After clicking Edit, select which widgets should appear using the Toggle Widget
dropdown. You can also resize and move widgets in this display. Once the changes are complete, click Save.
The following widgets are available in Email Metrics:
Widget Description
Utilization Displays an overview of email traffic in the network. This includes the following:
l Average Emails Processed Per Day
Productivity Displays data primarily related to mass recipient emails, including Email Flagged
as Spam and Suspected Newsletter. This widget also includes a count for Emails
Detected with Adult Content.
Security Displays a summary of threats and attacks originated by emails. This includes the
following:
l Known or Suspected Attachment-based Attacks
Widget Description
l Known or Suspected URL-based Attack
l Known or Suspected Impersonation-based Threats
Email Bandwidth An area chart that displays the amount of bandwidth used by email traffic, which
includes data for inbound emails and spam emails over time. Mouse over the
chart to display a tooltip of values for inbound and spam emails at that time.
Email Count A stacked bar chart that displays the number of emails over time by inbound
emails and spam emails. Mouse over the chart to display a tooltip of values for
inbound or spam emails at that sample time.
Top Senders by Email Size A pie chart that displays the email accounts which have sent the largest emails by
size. Mouse over the chart to display a tooltip of the email account and the amount
of emails sent by size and percentage.
Top Recipients by Email Size A pie chart that displays the email accounts which have received the largest
emails by size. Mouse over the chart to display a tooltip of the email account and
the amount of emails received by size and percentage.
Top Recipients by Count A race bar chart that displays the top email accounts with highest number of
emails received. The chart is animated to show the number of emails for each
account over time.
Top Senders by Count A race bar chart that displays the top email accounts with highest number of
emails sent. The chart is animated to show the number of emails for each account
over time.
Top Malware Senders Displays email accounts that have sent the highest number of malwares using
email.
Top Phishing Senders Displays email accounts with the highest number of attempts to send phishing
emails.
Top Spam Senders Displays spammer email accounts sorted by email count.
SOC dashboard
The SOC Dashboard provides an overview of incidents, events, and alerts. By clicking on widgets in the dashboard, you
can open the detailed information in the Incidents & Events pane, as well as other panes in the FortiAnalyzer GUI.
Use the time range dropdown to filter all widgets in the SOC Dashboard. You can customize which widgets appear in the
dashboard. After clicking Edit, select which widgets should appear using the Toggle Widget dropdown. You can also
resize and move widgets in this display. Once the changes are complete, click Save.
By default, the Statistics widget displays at the top of the dashboard. The following is available in the Statistics widget in
the SOC Dashboard:
Statistic Description
High Severity Incidents Displays the number of high severity incidents within the filtered time range. Click
the card to open Incidents & Events > Incidents, filtered by high severity and the
same time range as SOC Dashboard.
Outbreak Alerts Displays the number of outbreak alerts within the filtered time range. Click the
card to open Incidents & Events > Event Monitor > All Events, filtered by
triggername=*outbreak* and the same time range as SOC Dashboard.
Compromised Host Displays the number of compromised hosts within the filtered time range. Click
the card to open FortiView > Threats > Indicator of Compromise, filtered by the
same time range as the SOC Dashboard.
Affected Users Displays the number of the affected User IDs according to the chosen time range.
Click the card to open the Identity tab in Fabric View > Asset Identity Center >
Asset Identity List, filtered by the User ID and the same time range as the SOC
Dashboard.
Active Connector Displays the number of active connectors. Click the card to open Incidents &
Events > Automation > Connectors.
Device Types Displays the number of unique platforms. Click the card to open Device Manager.
In addition to the Statistics widget, the following widgets are also available in the SOC Dashboard:
Widget Description
Events Map Displays the top events with their affected endpoints and the severity of events
(critical, high, medium, low) within the filtered time range and sorted by the
number of events.
Incident Category Displays the number of incidents by incident category within the filtered time
range. Click a bubble to open Incidents & Events > Incidents, filtered by category
and the same time range as SOC Dashboard.
Top Incidents Displays the top incidents sorted by severity. Click an entry to open the Incident
Analysis pane for that incident.
Events and Incidents Displays the log types, events severity, and incident severity. Mouse over to
display the number of events and the number of incidents generated by events.
Use the Device Manager pane to add, configure, and manage devices and VDOMs.
After you add and authorize a device or VDOM, the FortiAnalyzer unit starts collecting logs from that device or VDOM.
You can configure the FortiAnalyzer unit to forward logs to another device. See Log Forwarding on page 381.
You can toggle between a Table View and Map View from the toolbar in Device Manager.
Table View:
Column Description
Column Description
HA Status Displays information if the device is part of a High Availability cluster. You can
manually identify devices as part of an HA cluster by editing the device
information. See Editing device information on page 83.
Serial Number Displays the serial number of the device. The serial number is unique to the unit
and does not change with firmware upgrades.
Last Log Time Displays the date and time that the last log was received from the device.
Logging Mode Displays the logging mode for the device. A lock icon displays when a secure
tunnel is being used to transfer logs from the device to the FortiAnalyzer unit.
Average Log Rate Displays the average rate at which the device is sending logs to the FortiAnalyzer
(Logs/Sec) unit in log rate per second. Click the number to display a graph of historical
average log rates.
Disk Quota Usage Displays how much of the allotted disk storage space has been consumed by
logs.
Map View:
The Map View provides an interactive map displaying the physical locations of authorized devices. You can navigate the
map by using your mouse. Zoom in or out with the scroll wheel or with the plus (+) or minus (-) buttons on the map. When
zoomed in, only the devices that are currently visible on the map are displayed in the sidebar. The sidebar provides
information about the devices, including logging status, average log rate, and disk quota usage.
ADOMs
You can organize connected devices into ADOMs to better manage the devices. ADOMs can be organized by:
l Firmware version: group all 7.0 devices into one ADOM, and all 7.2 devices into another.
l Geographic regions: group all devices for a specific geographic region into an ADOM, and devices for a separate
region into another ADOM.
l Administrator users: group devices into separate ADOMs based for specific administrators responsible for the
group of devices.
l Customers: group all devices for one customer into an ADOM, and devices for another customer into another
ADOM.
FortiAnalyzer, FortiCache, FortiClient, FortiDDos, FortiMail, FortiManager, FortiSandbox, FortiWeb, Chassis, and
FortiCarrier devices are automatically placed in their own ADOMs.
l Security Fabric: group all devices that are within the Security Fabric.
Each administrator profile can be customized to provide read-only, read/write, or restrict access to various ADOM
settings. When creating new administrator accounts, you can restrict which ADOMs the administrator can access, for
enhanced control of your administrator users. For more information on ADOM configuration and settings, see
Administrative Domains (ADOMs) on page 364.
You can add FortiClient EMS servers to FortiAnalyzer. Authorized FortiClient EMS servers are added to the default
FortiClient ADOM. You must enable ADOMs to work with FortiClient EMS servers in FortiAnalyzer. When you select the
FortiClient ADOM and go to the Device Manager pane, the FortiClient EMS servers are displayed. See also FortiClient
support and ADOMs on page 365.
Unauthorized devices
When a device is configured to send logs to FortiAnalyzer but has not yet been authorized, it is displayed in Device
Manager > Device & Groups > Unauthorized Devices. From this device group, you can authorize, delete, or hide devices
by using the toolbar buttons or the right-click menu.
The Unauthorized Devices device group is not available when all added devices are
authorized.
Enable Display Hidden Devices to view devices that were previously hidden.
Click Return to view the Device Manager pane containing authorized devices.
The Unauthorized Devices device group includes the following default columns:
Column Description
Serial Number Displays the serial number of the device. The serial number is unique to the unit
and does not change with firmware upgrades.
You can add FortiAnalyzer devices to FortiManager and manage them. When you add a FortiAnalyzer device to
FortiManager, FortiManager automatically enables FortiAnalyzer features. FortiAnalyzer and FortiManager must be
running the same OS version, at least 5.6 or later.
Logs are stored on the FortiAnalyzer device, not the FortiManager device. You configure log storage settings on the
FortiAnalyzer device; you cannot change log storage settings using FortiManager.
For more information, see Adding FortiAnalyzer devices in the FortiManager Administration Guide.
In Device Manager on FortiAnalyzer, a message informs you the device is managed by FortiManager and all changes
should be performed on FortiManager to avoid conflict. The top right of this pane displays a lock icon. If ADOMs are
enabled, the System Settings > ADOMs pane displays a lock icon beside the ADOM managed by FortiManager. When
you delete FortiAnalyzer from FortiManager, the ADOM on FortiAnalyzer should be unlocked. If the ADOM remains
locked, you will not be able to manage the devices. To unlock the ADOM, enter the following command in the
FortiAnalyzer CLI:
diagnose dvm adom unlock <adom>
For more information about this command, see the FortiAnalyzer CLI Reference.
Adding devices
You must add and authorize devices and VDOMs to FortiAnalyzer to enable the device or VDOM to send logs to
FortiAnalyzer. Authorized devices are also known as devices that have been promoted to the DVM table.
You must configure devices to send logs to FortiAnalyzer. For example, after you add and
authorize a FortiGate device with FortiAnalyzer, you must also configure the FortiGate device
to send logs to FortiAnalyzer. In the FortiGate GUI, go to Log & Report > Log Settings, and
enable Send Logs to FortiAnalyzer/FortiManager.
This section describes how to add model devices and VDOMs to the FortiAnalyzer using zero-touch provisioning (ZTP).
When using the Add Device wizard, model devices added to the FortiAnalyzer unit using a serial number are authorized
and are ready to begin sending logs. When a FortiGate model is configured using a pre-shared key, you must also
configure the key on the device itself before it will be authorized on FortiAnalyzer.
Pre-shared Key Enter a pre-shared key for the device. If using a pre-shared key, each device
must have a unique pre-shared key
Only FortiGate devices can be added to FortiAnalyzer using a pre-shared key.
You must also configure this pre-shared key on the corresponding FortiGate
device. See Configuring a pre-shared key on FortiGate on page 78
Device Model Select the model of the device from the dropdown.
4. Click Next.
The device is added to the ADOM and, if successful, is ready to begin sending logs to the FortiAnalyzer unit.
5. Click Finish to finish adding the device and close the wizard.
When configuring a FortiGate model device on FortiAnalyzer using a pre-shared key, the pre-shared key must also be
configured on FortiGate using the following CLI commands. This can be done after the FortiGate has been configured to
send logs to FortiAnalyzer in Log & Report > Log Settings.
Authorizing devices
You can configure supported devices to send logs to the FortiAnalyzer device. These devices are displayed in the root
ADOM as unauthorized devices. You can quickly view unauthorized devices by clicking Unauthorized Devices in the
quick status bar. You must authorize the devices before FortiAnalyzer can start receiving logs from the devices.
When ADOMs are enabled, you can assign the device to an ADOM. When authorizing multiple devices at one time, they
are all added to the same ADOM.
By default, FortiAnalyzer expects you to use the default admin account with no password. If
the default admin account is no longer usable, or you have changed the password, the device
authorization process fails. If the device authorization fails, delete the device from
FortiAnalyzer, and add the device again by using the Add Device wizard, where you can
specify the admin login and password.
When you delete a device or VDOM from the FortiAnalyzer unit, its raw log files are also deleted. SQL database logs are
not deleted.
To authorize devices:
1. In the root ADOM, go to Device Manager and click Unauthorized Devices in the quick status bar. The content pane
displays the unauthorized devices.
2. If necessary, select the Display Hidden Devices check box to display hidden unauthorized devices.
3. Select the unauthorized device or devices, then click Authorize. The Authorize Device dialog box opens.
4. If ADOMs are enabled, select the ADOM in the Add the following device(s) to ADOM list. If ADOMs are disabled,
select root. The default value is None.
If you try to authorize devices having different firmware versions than the selected ADOM
version, the system shows a Version Mismatch Warning confirmation dialog.
If you authorize the devices in spite of the warning, the configuration syntax may not be
fully supported in the selected ADOM.
You can hide unauthorized devices from view, and choose when to view hidden devices. You can authorize or delete
hidden devices.
1. In the root ADOM, go to Device Manager and click Unauthorized Devices in the quick status bar. The content pane
displays the unauthorized devices.
2. Select the unauthorized device or devices, then click Hide.
The unauthorized devices are hidden from view.
You can view hidden devices by selecting the Display Hidden Devices check box.
Adding an HA cluster
You can use a HA cluster to synchronize logs and data securely among multiple FortiGate devices.
An HA cluster can have a maximum of four devices: one primary device with up to three backup devices. All the devices
in the cluster must be of the same FortiGate series and must be visible on the network.
You can use auto-grouping in FortiAnalyzer to group devices in a cluster based on the group
name specified in Fortigate's HA cluster configuration. For auto-grouping to work properly,
each FortiGate cluster requires a unique group name.
If a unique group name is not used, auto-grouping should be disabled.
FAZ # config system global
(global)# set ha-member-auto-grouping disable
To create a HA cluster:
1. If using ADOMs, ensure that you are in the correct ADOM.
2. Add the devices to the Device Manager.
3. Choose a primary device, and click Edit.
4. In the Edit Device pane, enable HA Cluster.
5. In the Action column, click the Add icon.
6. In the Add Existing Device column, enable the toggle to select an existing device from the dropdown.
Alternatively, you can disable the toggle and enter the Serial Number of the device.
The following steps describe how to add and authorize a FortiGate device on FortiAnalyzer through the FortiAnalyzer
Fabric connector configuration on FortiOS.
1. In FortiAnalyzer, go to System Settings > Settings and configure the Fabric Authorization address and port.
2. On the FortiGate, go to Security Fabric > Fabric Connectors, and double-click the Logging & Analytics card.
3. Select the Settings tab, and then select the FortiAnalyzer tab.
4. Configure the details of your FortiAnalyzer, including the IP address, and click OK.
The FortiAnalyzer Connection status is Unauthorized.
5. Click Authorize.
The Fortinet Security Fabric authorization dialog appears.
7. Select Approve to allow FortiAnalyzer to authorize the FortiGate, and click OK.
If the authorization is successful, you will see a message confirming that the FortiGate is authorized by
FortiAnalyzer.
Managing devices
Use the tools and commands in the Device Manager pane to manage devices and VDOMs.
The following buttons and menus are available for selection on the toolbar:
Button Description
Add Device Opens the Add Device Wizard to add a device to the FortiAnalyzer unit. The
device is added, but not authorized. Unauthorized devices are displayed in the
Unauthorized Devices tree menu.
Device Group Displays menu items including Create New Group, Edit Group, and Delete Group.
New device groups are added to the Device & Groups tree menu. Select a custom
device group to edit or delete it.
Delete Deletes the selected devices or VDOMs from the FortiAnalyzer unit.
When you delete a device, its raw log files are also deleted. SQL database logs
are not deleted.
More Displays more menu items, including Import Device List and Export Device List.
Show Charts Enable or disable the charts that display above the Table View. From the
dropdown, you can select the charts that display above the Table View.
Column Settings Click to select which columns to display or select Reset to Default to display the
default columns.
Search Type the name of a device. The content pane displays the results. Clear the
search box to display all devices in the content pane.
Use the Edit Device page to edit information about a device. The information and options available on the Edit Device
page depend on the device type, firmware version, and which features are enabled.
Admin User Change the administrator user name for the device.
If the FortiAnalyzer serial number is not specified on the FortiGate or if
Certificate Verification is disabled, the admin user/password specified here is
used by FortiAnalyzer to login to the FortiGate.
For more information on Certificate Verification, see the
FortiGate/FortiOS CLI Reference.
Allow Access to Enable to allow the authorized FortiGate device to consume the
FortiAnalyzer REST API FortiAnalyzer's REST API.
Allow Access to FortiGate This toggle is read-only. This setting indicates if the device allows
REST API FortiAnalyzer to access its JSON APIs configured on the device side. This
setting must be configured on the FortiGate.
HA Cluster Select to identify the device as part of an HA cluster, and to identify the other
device in the cluster by selecting them from the drop-down list, or by inputting
their serial numbers.
This field is used to display the location of the device on maps throughout the
GUI.
See also Google Map integration on page 35.
Meta Fields Displays default and custom meta fields for the device. Optional meta fields
can be left blank, but required meta fields must be defined.
See also Setting values for required meta fields on page 86.
You can display a graph of the historical, average log rates for each device.
You can connect to the GUI of an authorized device from Device Manager.
When a required meta field is defined for a device object, a column automatically displays on the Device Manager pane.
The column displays the value for each device. When the required meta field lacks a value, an exclamation mark
displays, indicating that you must set the value.
See also Meta Fields on page 400.
1. Go to Device Manager.
2. View the columns.
A column displays for required meta fields.
In the following example, a column named location is displayed for the required meta field named location. A value
of San Jose is defined for one device, but no value is defined for the other device.
4. Under Meta Fields, complete the options labeled as Required, and click OK.
The value displays on the Device Manager pane.
Device groups
Device groups are displayed in Device Manager > Device & Groups. All devices added to FortiAnalyzer are included in a
default device group. You can create custom device groups as well to organize devices for convenient selection in other
features of FortiAnalyzer.
Type in the Search field to search for device groups by name. Click to sort the list of device groups in ascending or
descending alphabetical order. The default device group will always remain at the top of the list. Select the device group
to display its list of devices in the Device Manager pane.
The maximum number of device groups that can be created is the same as the maximum
number of devices/VDOMs supported for your VM license or model. See the FortiAnalyzer
data sheet on https://www.fortinet.com/ for information about the maximum number of
supported devices/VDOMs for your VM license or device.
Once created, custom device groups can be selected in device filters for FortiView and Log View, and they can also be
used in event handlers and reports.
1. Go to Device Manager.
2. From the Device Group dropdown in the toolbar, click Create New Group.
The Create New Device Group dialog opens.
3. In the Group Name field, type a name to identify the group of devices.
Description is optional.
4. Click Add Member to view the list of devices and existing device groups.
5. Select the check box for each device to add to the group, and click Add.
FortiAnalyzer allows nested device groups. For example, you can create Device Group A
and add it under Device Group B.
6. Click OK.
The device group is now available in Device Manager.
You can manage device groups from Device Manager. The device groups display in the left-pane. This includes default
device groups, such as All Logging Devices and Unauthorized Devices. Right-click a device group to open the shortcut
menu, which is also available from the Device Group dropdown.
From the Device Group dropdown in the toolbar, select one of the following options:
Option Description
Edit Group Edit the selected device group. You cannot edit default device groups.
Delete Group Delete the selected device group. You cannot delete default device groups.
To allow tuning of CPU and memory usage in high capacity environments, you can opt to
disable FortiView, which stops the background processing for this feature. See Enabling and
disabling FortiView on page 131.
FortiView is a comprehensive monitoring system for your network that integrates real-time and historical data into a
single view. It can log and monitor threats to networks, filter data on multiple levels, keep track of administrative activity,
and more.
FortiView allows you to use multiple filters in the consoles, enabling you to narrow your view to a specific time, by user ID
or local IP address, by application, and others. You can use it to investigate traffic activity such as user
uploads/downloads or videos watched on YouTube on a network-wide user group or on an individual-user level.
In FortiView dashboards, you can view summaries of log data such as top threats to your network, top sources of
network traffic, and top destinations of network traffic.
Depending on which dashboard you are viewing, information can be viewed in different formats: table, bubble, map, or
tile. Alternative chart types are available in each widget's Settings menu.
For each summary, you can drill down to see more details.
FortiGate, FortiCarrier, and FortiClient EMS devices support FortiView.
Some dashboards require that specific log types are enabled before they can be used. When an ADOM does not include
any logs of the required type, the dashboard appears in gray and includes an information icon that indicates what logs
must be enabled before the dashboard can be used.
The FortiView module, which includes the FortiView pane, can be disabled to improve
performance in high capacity environments. For more information, see Enabling and disabling
FortiView on page 131
When ADOMs are enabled, each ADOM has its own data analysis in FortiView.
Fabric ADOMs will show data analysis from all eligible devices in the Security Fabric.
FortiView displays data from Analytics logs. Data from Archive logs is not displayed in FortiView. For more information,
see Analytics and Archive logs on page 42.
FortiView dashboards
Many dashboards display a historical chart in a table format to show changes over the selected time period.
If you sort by a different column, the chart shows the history of the sorted column. For example, if you sort by Sessions
Blocked/Allowed, the chart shows the history of blocked and allowed sessions. If you sort by Bytes Sent/Received, the
chart shows the history of bytes sent and received.
When you drill down to view a line item, the historical chart show changes for that line item.
Displays a map of the world that shows the top traffic destinations starting
at the country of origin. Threats are displayed when the threat score is
greater than zero and either the source or destination IP is a public IP
address.
Threat Map The Threat Window below the map, shows the threat, source, destination,
severity, and time. The color gradient of the lines indicate the traffic risk. A
yellow line indicates a high risk and a red line indicates a critical risk.
This view can be filtered by device, time, source, and destination. See also
Threats Viewing the threat map on page 94.
Displays end users with suspicious web use compromises, including end
users’ IP addresses, overall threat rating, and number of threats.
Indicator of To use this feature:
Compromise 1. UTM logs of the connected FortiGate devices must be enabled.
2. The FortiAnalyzer must subscribe to FortiGuard to keep its threat
database up-to-date.
Lists the policy sessions by policy, device name, VDOM, number of hits,
Policy Hits
bytes, and last used time and date.
Summarizes the DNS activity on the network. Double click an entry to drill
DNS Logs
down to the specific details about that domain.
Top Cloud Users Displays the top cloud users on the network.
Displays the top applications used on the network including the application
name, category, risk level, and sessions blocked and allowed. Bytes sent
and received can also be enabled through the widget settings. Top
Top Applications
Applications can be viewed as a stackbar, bar, table, or bubble chart.
For a usage example, see Finding application and user information on
page 111.
Applications &
Websites Top Website
Displays the top allowed and blocked website domains on the network.
Domains
Top Website
Displays the top website categories.
Categories
Displays the users who are accessing the network by using the following
types of security over a virtual private network (VPN) tunnel: secure socket
layers (SSL) and Internet protocol security (IPsec).
SSL & Dialup IPsec You can view VPN traffic for a specific user from the top view and drilldown
VPN views. In the top view, double-click a user to view the VPN traffic for the
specific user. In the drilldown view, click an entry from the table to display
the traffic logs that match the VPN user and the destination.
Displays the names of VPN tunnels with Internet protocol security (IPsec)
Site-to-Site IPsec
that are accessing the network.
Admin Logins Displays the users who logged into the managed device.
Failed
Displays the IP addresses of the users who failed to log into the managed
Authentication
device.
Attempts
Using FortiView
When ADOMs are enabled, FortiView displays information for each ADOM. Please ensure you are in the correct ADOM.
See Switching between ADOMs on page 31.
l Viewing FortiView dashboards on page 93
l Filtering FortiView on page 96
l Creating custom views for FortiView on page 97
l Viewing related logs on page 98
l Exporting filtered summaries on page 99
l Monitoring resource usage of devices on page 99
l Long-lived session handling on page 99
When viewing FortiView dashboards, use the controls in the toolbar to select a device, specify a time period, refresh the
view, and switch to full-screen mode.
Many widgets on FortiView dashboards let you drill down to view more details. To drill down to view more details, click,
double-click, or right-click an element to view details about different dimensions in different tabs. You can continue to drill
down by double-clicking an entry. Click the close icon in the widget's toolbar to return to the previous view.
You can view an animated world map that displays threats from unified threat management logs. By default, threats are
displayed from all devices in real-time.
The threat map can also be filtered according to your needs. From the toolbar, you can filter threats in the threat map by
devices and timeframe. At the top right of the widget, click menu icon > Settings to filter by the threats' source and
destination.
When filtering a specific timeframe, the threat map will display in replay mode. In this mode, you can use the play/pause
button to watch a replay of the threat map in the selected timeframe. You can adjust the speed of the replay by
increasing or decreasing the Replay rate. All threats will appear in the overlay threat window as they occur on the map.
You must specify the longitude and latitude of the device to enable threats for the device to
display in the threat map. You can edit the device settings to identify the geographical location
of the device in Device Manager. For more information, see Editing device information on
page 83
4. In the Threat Window, view the Time, Threat, Severity(Score), Source, and Destination for each threat.
Filtering FortiView
Filter FortiView widgets using the Add Filter box in the toolbar or by right-clicking an entry and selecting a context-
sensitive filter. You can also filter by specific devices or log groups and by time.
value. Click NOT to negate the filter value. You can add multiple filters and connect them with “and” or “or”.
l Text Search: Click the Switch to Text Search icon at the right end of the Add Filter box. In Text Search mode,
enter the search criteria (log field names and values). Click the Switch to Filter Mode icon to go back to Filter
Mode.
2. In the Device list, select a device.
3. In the Time list, select a time period.
In the selected view, right-click an entry and select a filter criterion (Search <filter value>).
Depending on the column in which your mouse is placed when you right-click, FortiView uses the column value as the
filter criteria. This context-sensitive filter is only available for certain columns.
Use FortiView > Custom Views to save the widgets, filter settings, device selection, and the time period for a FortiView
dashboard.
You can also create custom views directly from a FortiView dashboard after setting the device and time period filters.
1. Go to FortiView.
2. In the sidebar, click the menu icon for Custom View, and select Create New.
The New Custom View dialog displays.
You can view the related logs for a FortiView summary in Log View. When you view related logs, the same filters that you
applied to the FortiView summary are applied to the log messages.
To view related logs for a FortiView summary, right-click the entry and select View Related Logs.
You can export filtered FortiView summaries or from any level of drilldown to PDF and report charts. Filtered summaries
are always exported in table format.
1. In the filtered summary view or its drilldown, select the tools icon in the top-right corner of the widget and choose
Export to PDF or Export to Report Chart.
2. In the dialog box, review and configure settings:
l Specify a file name for the exported file.
l If you are in a drilldown view, the tab you are in is selected by default. You can select more tabs. If you are
exporting to report charts, the export creates one chart for each tab.
3. Click OK.
Charts are saved in the Chart Library. You can use them in the same way you use other charts.
Only log field filters are exported. Device and time period filters are not exported.
You can monitor how much FortiAnalyzer system resources (e.g., CPU, memory, and disk space) each device uses.
When ADOMs are enabled, this information is displayed per ADOM. In a specific ADOM, you can view the resource
usage information of all the devices under the ADOM.
Go to FortiView > System > Resource Usage to monitor resource usage for devices.
Because traffic logs are only sent at the end of a session, long-lived sessions can be unintentionally excluded when
narrowing searches in FortiView. To account for this, interim traffic logs can be enabled through FortiOS, allowing
FortiView to show the trend of session history rather than one large volume once the session is closed.
For a long-lived session with a duration greater than two minutes, interim traffic logs are generated with the Log ID of 20.
l For interim traffic logs, the sentdelta and rcvddelta fields are filled in with an increment of bytes which are
sent/received after the start of the session or previous interim traffic log.
l Interim traffic logs are not counted in Sessions, but the sentdelta and recvddelta in related traffic logs will be added
when calculating the sent and received bytes.
When a long-lived session ends, a traffic log with a Log ID of 13 is sent which indicates the session is closed.
DNS IP addresses
The results for each affected end user is displayed in Indicator of Compromise. You can drill down from table to review
the details of the affected host, including the detect pattern and detect method for each indicator of compromise. You can
also drill down further from these detections to review the logs where the matches were initially found in FortiAnalyzer.
See Working with IOC information on page 101.
Indicator of Compromise can be configured to rescan logs at regular intervals using new definitions from FortiGuard.
Email filter logs from FortiMail devices are also supported by IOC, and can be rescanned when enabled in the Indicator
of Compromise rescan settings. See Managing an IOC rescan policy on page 105.
When a log entry is received and inserted into the SQL database, the log entry is scanned and compared to the blocklist
and suspicious list in the IOC threat database that is downloaded from FortiGuard.
If a match is found in the blocklist, FortiAnalyzer displays the endpoint in Indicator of Compromise with a Verdict of
Infected.
If a match is found in the suspicious list, FortiAnalyzer flags the endpoint for further analysis.
When an endpoint is displayed in Indicator of Compromise, all the suspicious logs which contributed are listed.
When the database is rebuilt, all log entries are reinserted and rescanned.
Chart Type Select one of the following: table (default), users IOC, or bubble.
Show Top Select the number of results to display. Different options are available according
to the Chart Type.
Only Show Rescan Only display results from rescan tasks. Disabled by default.
For information about rescan settings, see Managing an IOC rescan policy on page 105
You can set the devices, time period, and filters for the dashboard. If there are regularly used filters, you can create a
custom view. See Creating custom views for FortiView on page 97
This chart type displays IOC line items in a table view. The total number of sources with indicators for compromise is
displayed above the table. Click the export icon to export the table information into a PDF or report chart.
There is a record for each source, and the # of Threats column displays the number of unique threat names associated
with that end user. To filter the table, click + to add a filter such as device ID, log type, or security action.
The following columns are available:
Last Detected The last time a threat was detected on the end user. A rescan icon indicates that
threats found also include results from an IOC rescan task.
Log Types The log types that identified the threats. This could be traffic, web filter, DNS, or
email filter log types.
Security Actions The actions taken against the threats, such as block, timeout, or close.
Verdict When threats are identified using the blocklist, the verdict is Infected.
# of Threats The number of unique threats associated with the end user.
You can drill down by double-clicking the record to view the different threats in the
Blocklist and Suspicious table views. In those views, you will also be able to drill
down further to the different logs where matches were found to the threat
database.
Acknowledge Indicates if the potential compromise has been acknowledged by the user. To add
an acknowledgment comment, click ACK and submit desired remark.
To drill down and view threat details for a particular endpoint, right-click a row and select Blocklist or Suspicious.
Alternatively, double-click a row to open the Blocklist. You can toggle between Blocklist and Suspicious from this view.
Detect Patterns The IP, URL, or domain that was matched to the blocklist or suspicious list in the
threat database. Click for more information from FortiGuard, including:
l Detect Pattern
l IOC Tags
l Confidence
l Live Ratings
l Events
l Reference URL
From this dialog, you can show the raw data for the detect pattern or report a
misrated indicator of compromise.
Threat Type The threat type as defined in FortiGuard. Click for a brief description.
Threat Name The threat name as defined in FortiGuard. Click for a brief description.
Detect Method The method for detecting the compromise. In the example above, it is
"infected-ip", which means an IP in the logs matches a blocklist IP in the
threat database. Threats can also be detected through infected URLs and
domains identified on the threat database.
# of Events The number of events matching this detect pattern that have been flagged for the
end user. There is a separate log for each event. You can double-click the row to
find more information about the logs.
Log Type The log type(s) where the potential compromise was detected.
Scan Time When the user was last scanned for IOC.
Double-click a record in the table to open Log View filtered to display the related events. For example, double-clicking a
record in the Blocklist table will display Log View filtered by the bl_pattern_id and the srcip.
In the Log View, you can double-click a record in the table to open the log details. Note that you have not left FortiView,
so you can click the breadcrumbs at the top of the pane to navigate back to the Blocklist or Indicator of Compromise
views. See below.
This chart type includes two panes: a rotating list of users and a map of incidents.
In the Sort By dropdown, select which top IOC to display in the bubble chart: by verdict or by number of threats. Mouse-
over a bubble to display the following information:
l Source
l Last Detected
l Host Name
l OS
l Log Types
l Security Actions
l Verdict
l # of Threats
l Achnowledge
l Device Name
l Device ID
Double-click a bubble to drill down to the Blocklist view for the related end user.
Indicator of Compromise can be configured to scan previous entries on regular intervals or when a new package is
received from FortiGuard so that FortiAnalyzer performs a rescan using the latest available definitions.
When IOC rescan is performed, the Ioc_Rescan tag is added to rescanned logs. Event handlers that include the Ioc_
Rescan tag in their rules will process rescanned logs and generate new alerts tagged with Ioc_Rescan. Real-time logs
matching these event handler rules continue to generate alerts without the Ioc_Rescan tag.
By default, the following basic event handlers include Ioc_Rescan tag for all rules:
l Default-Compromised Host-Detection-IOC-By-Endpoint
l Default-Compromised Host-Detection-IOC-By-Threat
Blocklist Count A count of the newly detected threats added to the blocklist.
In FortiView > Threats & Events > Indicator of Compromise, a rescan icon is displayed in the Last Detected column
if threats are found during a rescan. To view only those hosts that had threats found during a rescan, go to the
Settings and enable Only Show Rescan.
For FortiMail email filter rescans, the endpoint which visited an allowed URL will be marked as compromised if the
URL is blocklisted in the latest URL blocklist. The compromised hosts are the users' email addresses which can be
found in the To field of the log.
Indicators of Compromise
Indicators of Compromise (IOC) detects compromised client hosts (endpoints) by comparing the IP, domain, and URL
visited against the TIDB package, downloaded daily from FortiGuard. Compromised hosts are listed in FortiView in a
table or map style, and drilling down on a compromised endpoint displays the details of detected threats.
l The TIDB package contains a blocklist which is made up of IPs, domains and URLs, and a suspicious URL list (also
called Crowdsource URLs). Only suspicious URLs have a score rating in the TIDB package. Once a URL is
included in the blocklist, the suspicious score rating is no longer performed.
l Once a new TIDB package has been downloaded by FortiAnalyzer, the previous package becomes obsolete.
l The blocklist statistics by endpoint are updated in near realtime (ASAP), and suspicious rating statistics by endpoint
are updated on a half-hour schedule.
l The IOC inspection is performed on a daily cycle because the updated FortiGuard TIDB package is received daily.
At the end of the day, the IOC endpoint summary is fixed and will not receive additional changes, and a new
summary will be created for the next day.
l Web Filter, DNS, and traffic logs from FortiGate, and email filter logs from FortiMail are inspected.
l The IOC module requires a license. Without a license, only demo TIDB packages are loaded into the FortiAnalyzer
image, and no updated package from FortiGuard is used in the IOC function.
l When a threat is detected, FortiAnalyzer sends a notification to the FortiGate via REST API. The FortiGate can be
configured to take automatic action against detected threats.
l IOC threat detection can be performed in both realtime and rescan mode. Realtime detection monitors new
incoming logs, whereas rescan mode checks historical logs against the new blocklist once an updated TIDB
package is available. Rescan mode does not check historical logs against the suspicious list. Realtime detection is
always enabled, and IOC rescan can be enabled or disabled.
The suspicious list is crowdsourced each day by FortiGuard AI from millions of global endpoint devices. The list is
comprised of IPs, URLs, and domains that have a low reputation, usually because they are questionable websites.
The TIDB package includes threat ranking scores which FortiAnalyzer normalizes using its internal logic. When an
endpoint visits a site that matches one included in the suspicious list, the score is deposited into the “reputation account”
for that endpoint. The total normalized score is then used to determine a verdict for the endpoint. The higher the score,
the higher the confidence. When a new TIDB package becomes available, the process to determine a verdict begins
again. FortiAnalyzer processes logs for all monitored endpoints against the new TIDB and will determine a verdict for
each endpoint based on their new normalized score.
Endpoints that visit suspicious sites on an infrequent basis are at a low risk for compromise and are not included in the
Indicator of Compromise watch list. The FortiAnalyzer IOC engine continues to monitor these endpoints until it has
enough confidence to produce a verdict, at which point they are given the verdict Low Suspicious and are added to the
watch list. Endpoints that regularly visit suspicious sites are at a higher risk for infection or may already be infected with
zero-day malware. These endpoints are assigned a verdict and are added to the Indicator of Compromise watch list.
Suspicious verdicts include:
l High suspicious (high confidence)
l Medium suspicious (medium confidence)
l Low suspicious (low confidence)
In the example below, an endpoint visits multiple sites included in the suspicious list, and as a result, has its verdict
changed from Low suspicious to Medium suspicious. The data included in this example is purely hypothetical for the
purpose of illustration.
The specific algorithm used for the decision to change the verdict of an endpoint is internal to FortiAnalyzer.
FortiAnalyzer periodically syncs its own IOC TIDB files to the version of IOC package downloaded by fmupdate. This is
performed on a one hour schedule.
To check the license and TIDB version used by FortiAnalyzer in the CLI:
FortiGate to FortiAnalyzer REST API authentication allows the FortiAnalyzer to send IOC alerts and trigger configured
automation rules, if configured.
To avoid flooding FortiGate with event alerts, you can configure a throttle which allows only one alert to be sent within a
set period of time for the same endpoint.
The default time period is one day (1440 minutes).
You can use FortiView to find information about your network. The following are some examples.
l Finding application and user information on page 111
l Analyzing and reporting on network traffic on page 111
l Finding FortiGate C&C detection logs on page 112
Company ABC has over 1000 employees using different applications across different divisional areas, including supply
chain, accounting, facilities and construction, administration, and IT.
The administration team received a $6000 invoice from a software provider to license an application called Widget-Pro.
According to the software provider, an employee at Company ABC is using Widget-Pro software.
The system administrator wants to find who is using applications that are not in the company’s list of approved
applications. The administrator also wants to determine whether the user is unknown to FortiGuard signatures, identify
the list of users, and perform an analysis of their systems.
A new administrator starts at #1 Technical College. The school has a free WiFi for students on the condition that they
accept the terms and policies for school use.
The new administrator is asked to analyze and report on the top source and destinations students visit, the source and
destinations that consume the most bandwidth, and the number of attempts to visit blocked sites.
FortiGate detected botnet events while performing an IOC scan. The administrator wants to view the C&C and logs with
SOC view in Compromised Hosts.
Column Value
3. In the Blocklist drill-down view, double-click an entry to view related logs. Log View is displayed.
C&C detection entries appear in either the Attack Name or Message columns with one of the following values:
Column Value
Monitors
The monitors in FortiView are designed for a network and security operations center where multiple dashboards are
displayed on large monitors.
In the FortiView monitors, dashboards display widgets with both real-time monitoring and historical trends. Centralized
monitoring and awareness help you to effectively monitor network events, threats, and security alerts. Use the FortiView
monitors to view multiple panes of network activity, including monitoring network security, indicators of compromise,
endpoints, Security Fabric, WiFi security, and FAZ system performance.
A typical scenario is to set up dashboards and widgets to display information most relevant to your network and security
operations. Use the main monitors in the middle to display important dashboards in a larger size. Then use the monitors
on the sides to display other information in smaller widgets.
For example, use the top monitor in the middle to display the Top Threat Destinations widget in full screen, use the
monitor(s) below that to display other Threats widgets, use the monitors on the left to display WiFi widgets at the top and
Local System Performance widgets at the bottom, and use the monitors on the right as a workspace to display widgets
showing the busiest network activity. You can move, add, or remove widgets.
Monitor dashboards and widgets are very flexible and have the following features:
l You can create predefined or custom dashboards.
l For both predefined and custom dashboards, you can add, delete, move, or resize widgets.
l You can add the same dashboard multiple times on the same or different monitors.
FortiView, including the monitors, can be disabled to improve performance in high capacity
environments. For more information, see Enabling and disabling FortiView on page 131
To prevent timeout, ensure Idle Timeout is greater than the widget's Refresh Interval. See Idle
timeout on page 447 and Settings icon on page 128.
FortiView monitors
FortiView includes predefined dashboards, which are listed below the separator in the FortiView tree menu.
Threats on page 116 Monitor the top security threats to your network.
Indicator of
Compromise on Monitor compromised and suspicious web use in your network.
page 117
FortiSandbox
Detections on page Monitor FortiSandbox detections on your network.
117
Local Threat
Threats & Research on page Monitor local threat research.
Events 117
Global Threat
Research on page Monitor global threat research.
118
Data Loss
Prevention on page Monitor data loss prevention detection.
118
Threat (FortiClient)
Monitor threat activity from FortiClient.
on page 118
Applications &
Websites on page Monitor the application and website traffic on your network.
119
Traffic Shaping
Monitor traffic shaping information.
Monitor on page 120
Endpoints on page
Monitor endpoint activity on your network.
121
Endpoints
(FortiClient) on page Monitor endpoint activity from FortiClient.
122
Traffic (FortiDDOS) Monitor FortiDDoS detected traffic activity. This chart requires Intrusion
Traffic on page 122 Prevention logs to be enabled.
Analysis
Traffic (FortiFirewall)
Monitors FortiFirewall traffic.
on page 122
Applications &
Websites
Monitor application and website activity from FortiClient.
(FortiClient) on page
123
VPN (FortiFirewall)
Monitors FortiFirewall VPN usage.
on page 123
FortiClient Software
Inventory on page Monitor the FortiClient endpoints sending logs to FortiAnalyzer.
123
FortiMail on page
Monitor FortiMail statistics.
123
FortiProxy on page
Monitor information from FortiProxy devices.
124
Secure SD-WAN
Monitor secure software-defined networking.
Monitor on page 124
SD-WAN
SD-WAN Summary
Monitor SD-WAN operations.
on page 125
Fabric Devices Monitor your network's Security Fabric rating, score, and topology.
Fabric State of
The information for this dashboard is available after you create a Security
Security on page
Fabric group in FortiGate and add it in FortiAnalyzer. The Security Fabric
127
can be selected in the settings options for each widget.
Local System
Local System
Performance on Monitor the local system performance of the FortiAnalyzer unit.
Performance
page 127
When upgrading versions prior to FortiAnalyzer 6.2.0, custom dashboards will not be migrated
and must be recreated.
Threats
Top Threat A world map, spinning 3D globe, or table showing the top 10, 20, 50, 100 threat destinations.
Destinations On the map view, hover the cursor over data points to see the source device and IP address,
destination IP address and country, threat level, and the number of incidents (blocked and
allowed).
Top Threats The top threats to your network. Hover the cursor over data points to see the threat, category,
threat level, threat score (blocked and allowed), and the number of incidents (blocked and
allowed).
The following incidents are considered threats:
l Risk applications detected by application control
Top Threats by The top threats by weight and count to your network from risk applications, intrusion incidents,
Weight & Count malicious websites, and malware/botnets.
Indicator of Suspicious web use compromises. By default, this widget includes two panes: a rotating list of
Compromise users and a map of incidents.
The rotating list of users automatically rotates through indicators of compromise. You can
pause autoplay or click > or < to manually move to another user.
The map displays the location of incidents.
Click the Rescan Task icon to configure the rescan settings and check rescan results. For
more information, see Managing an IOC rescan policy on page 105.
Click the Settings icon to change the following:
l Chart Type: users IOC (default) or table.
l Show Top: different options are available according to the Chart Type.
l Refresh Interval: Every 30 Minutes by default.
l Autoplay Interval: Every 20 Seconds by default.
l Show Acknowledged: disabled by default.
l Only Show Rescan: disabled by default.
FortiSandbox Detections
FortiSandbox FortiSandbox detection detail, including date, file name, end user, destination IP, analysis,
Detection action, and service.
FortiSandbox - The number of files detected by FortiSandbox by type: Malicious, Suspicious, Clean, and
Scanning Statistics Others.
FortiSandbox - Top Users or IP addresses that have the highest number of malicious and suspicious files
Malicious detected by FortiSandbox.
& Suspicious File
Users
Local Threat The top threats based on the current ADOM. The threat map can be viewed by Virus, IPS,
Prevalence Botnet, and Application.
Hover your mouse over a datapoint in the chord chart to view additional details.
Local Threat Research data is from FortiGuard and not from FortiGate.
Worldwide Threat The top threats globally by industry based on UTC. The threat map can be viewed by Virus,
Prevalence By IPS, Botnet, and Application. The widget is available as a chord chart or map.
Industry - Today By default, the threat map displays information from accross all industries. You can change
(UTC) which industries are included in the chart by clicking the All Industries dropdown and removing
a check mark from any industries you want to exclude.
Global Threat Research data is from FortiGuard and not from FortiGate.
Threat (FortiClient)
Threat The top threats to your network from risk applications, intrusion alerts, malicious websites,
and malware/botnets.
Only visible in a Fabric ADOM.
DLP Trends Data loss prevention trends by number of blocked and allowed events.
Top Destination Top destination countries by data loss prevention occurrences and bytes.
Countries
Top Users Top users by data loss prevention occurrences and bytes.
Top Protocols Top protocols by data loss prevention occurrences and bytes.
Top DLP Events Top data loss prevention events in a table view.
Top DLP Profile Top data loss prevention profile hits by occurrences and bytes.
Hits
Sensitive Files Sensitive files being accessed, including their data loss prevention occurences.
being Accessed
Traffic
Top Sources The highest network traffic by source IP address and interface, sessions (blocked and
allowed), threat score (blocked and allowed), and bandwidth (sent and received).
Top The historical network traffic by country/region, sessions, bandwidth, or threat score.
Country/Region
Policy Hits Over The historical policy hits from recent traffic.
Time by Bandwidth
User Data Flow Bandwidth breakdown of top user destination country/region or application usage.
Top Sources Today Near real-time network traffic by blocked and allowed sessions.
Top Interface of Line charts for the top 10 sent bit rate of interfaces over the specified time period.
Sent Bit Rate Mouse over the line charts to view bit rate information for each interface.
Top Interface of Line charts for the top 10 received bit rate of interfaces over the specified time period.
Received Bit Rate Mouse over the line charts to view bit rate information for each interface.
Top Applications The top applications used on the network, including application name, risk level, category,
sessions (blocked and allowed), and bytes (sent and received).
Cloud Applications The historical sessions of cloud applications used on the network.
Over Time by
Sessions
Top Applications The historical sessions of applications used on the network, including application name, risk
Over Time by level, category, sessions (blocked and allowed), and bytes (sent and received).
Sessions
Top Endpoint The top applications used on the network, including application name, risk level, category,
Applications sessions (blocked and allowed), and bytes (sent and received).
Only available in a Fabric ADOM.
Website Browsing The historical websites browsing sessions from recent traffic.
Over Time by
Sessions
User Overview The number of high risk users, including a summary of the top high risk users.
Known Devices with Failed The number of known devices with a failed posture check by user.
Posture Check
Top Users by Connections Top users by number of connections, allowed and blocked.
Private Apps Access A list of private apps, including their number of allowed and blocked connections.
Public Cloud Business Apps A list of public cloud business apps, including their number of allowed and blocked
Access connections.
Policy Overview The number of violated policies, including a summary of the top violated policies.
Private & Public Applications Private and public app access failures.
Access Failure History
CASB Apps Access A list of CASB apps, including their number of allowed and blocked sessions.
VPN
Top Dialup VPN The users accessing the network using SSL or IPsec over a VPN tunnel.
VPN Site-to-Site The names of VPN tunnels with Internet protocol security (IPsec) that are accessing the
network.
This dashboard monitors the traffic shaping information in FortiGate logs. It includes the following widgets:
Bandwidth The bandwidth of traffic shapers over time. Mouse over the line chart to display the bandwidth
at a specific time.
Dropped Bytes The total dropped bytes per shaper. Mouse over the line chart to display a summary of
Over Time Per dropped bytes per shaper at a specific time. Click a shaper in the legend to hide/unhide it in
Shaper the line chart. Greyed-out shapers in the legend are hidden in the line chart.
Click More details to display the traffic shaping policy hits information in a table view. This
table includes the total sessions and bytes (sent/received) by shaping policy.
Endpoints
Top Endpoint Vulnerability information about FortiClient endpoints including vulnerability name and CVE ID.
Vulnerabilities
Top Endpoint Vulnerability information about FortiClient endpoints including vulnerability name and CVE ID.
Vulnerabilities Only available in a Fabric ADOM.
(FortiClient)
Top Endpoint Vulnerability information about FortiClient endpoints including source IP address and device.
Devices with
Vulnerabilities
Top Endpoint Vulnerability information about FortiClient endpoints including source IP address and device.
Devices with Only available in a Fabric ADOM.
Vulnerabilities
(FortiClient)
Top Endpoint Vulnerability information about FortiClient endpoints including vulnerability name and CVE ID.
Vulnerabilities Only available in a Fabric ADOM.
(FortiClient)
Endpoint Devices Information about FortiClient endpoints including source IP address, device, and
vulnerabilities.
Only available in a Fabric ADOM.
Traffic (FortiDDOS)
Traffic (FortiFirewall)
Top Sources The highest network traffic by source IP address and interface, sessions (blocked and
allowed), threat score (blocked and allowed), and bandwidth (sent and received).
Top The historical network traffic by country/region, sessions, bandwidth, or threat score.
Country/Region
Policy Hits Over The historical policy hits from recent traffic.
Time by Bandwidth
User Data Flow Bandwidth breakdown of top user destination country/region or application usage.
Application The top applications used on the network, including application name, risk level, category,
sessions (blocked and allowed), and bytes (sent and received).
Only available in a Fabric ADOM.
VPN (FortiFirewall)
Top Dialup VPN The users accessing the network using SSL or IPsec over a VPN tunnel.
VPN Site-to-Site The names of VPN tunnels with Internet protocol security (IPsec) that are accessing the
network.
FortiClient The total number of apps installed, top apps, new apps installed, top apps by installs, and top
Software Inventory hosts by number of apps.
FortiMail
Statistics History The statistics history from FortiMail that displays the summary of total messages and spam in
the selected time period.
Place your mouse over a line in the chart to view a tooltip which includes the total messages
and total spam for the corresponding date and time.
Top Sender by The top email, virus, and spam senders in the selected time period.
Categories Place your mouse over a bar in the graph to view a tooltip which includes the sender, count,
size, virus count, and spam count.
This widget may be viewed by Count, Size, Virus Count, and Spam Count.
Top Recipient by The top email, virus, and spam recipients in the selected time period.
Categories Place your mouse over a bar in the graph to view a tooltip which includes the recipient, count,
size, virus count, and spam count.
This widget may be viewed by Count, Size, Virus Count, and Spam Count.
Threat Statistics The summary of spam and virus mail in the selected time period.
Mail Statistics The summary of email messages where the FortiMail detected viruses, spam, or neither in the
selected time period.
Place your mouse over a bar in the graph to view a tooltip which includes the date/time,
classifier, and count.
This widget may be viewed by Count, Size, Scan Speed, and Transfer Speed.
Outbreak Statistics The summary of the number of email messages that the FortiSandbox unit is scanning in the
(FortiSandbox) selected time period. Email messages are tracked as either clean, containing a malicious file,
or containing a malicious URL.
Place your mouse over a bar in the graph to view a tooltip which includes the date/time, clean,
malicious file, and malicious URL.
This widget requires a FortiSandbox.
Statistics Summary The summary of spam, viruses, and not spam in the selected time period, including the
classifier details per category, the corresponding total number of every classifier, the subtotal
number, the subtotal percentage of every category, and the total number of all emails.
FortiProxy
SD-WAN Bandwidth The bandwidth of the SD-WAN network over time. This widget displays a line chart of the
Overview sent/received rate (bps) in the selected time period for SD-WAN members interfaces.
SD-WAN Rules The SD-WAN rule traffic utilization by interface and application.
Utilization
SD-WAN Utilization The share of bandwidth utilization by application for each WAN link.
by Application
SD-WAN Events This widget displays a table chart for SD-WAN event logs which have a level higher than
notice (warning, error, etc.) within the selected time period.
Application The total bandwidth from all applications as well as the bandwidth per-SD-WAN interface.
Bandwidth This widget can be viewed in a sanky chart or table chart format.
Utilization
Per-Application The performance for the selected application based on chosen metric. You can select an
Performance application in the widget's Application dropdown menu.
Latency, Jitter, Packet Loss, and Bandwidth metrics are available.
SD-WAN Interfaces The information for SD-WAN interfaces and ADVPN shortcut interfaces.
Latency, Jitter, and Packet Loss metrics are available.
Audio MOS Score The MOS score by interface. Mousing over the chart displays a summary of the MOS score
and VoIP quality at that point.
The interface must have a performance SLA with MOS enabled to display in the chart.
Speed Test The upload and download speeds for all tests run on SD-WAN interfaces through a specified
time.
This widget requires event logs generated by speed tests from FortiOS 7.4.0 or higher.
Health Check Status This widget dynamically creates a child-widget for each health check where a line chart of
latency, jitter, and packet loss in the selected time period for SD-WAN interfaces is
displayed.
To update the Refresh Interval, click the settings icon at the top of the widget, and then select a
value from the dropdown.
To filter a chart, click a key in the legend.
SD-WAN Summary
Audio MOS Score The MOS score across all SD-WAN devices.
Speed Test By The combined upload and download speeds for all tests run on SD-WAN interfaces on each
Bandwidth device.
This widget requires event logs generated by speed tests from FortiOS 7.4.0 or higher.
Speed Test The upload and download speeds for all tests run on SD-WAN interfaces through the
Summary specified time period on selected devices.
This widget requires event logs generated by speed tests from FortiOS 7.4.0 or higher.
WiFi
Authorized APs The names of authorized WiFi access points on the network.
Top Rogue APs The top SSID (service set identifiers) of unauthorized WiFi access points on the network.
Hover the cursor over data points to see the SSID and total live time.
Top SSID The top SSID (service set identifiers) of authorized WiFi access points on the network. Hover
the cursor over data points to see the SSID and bytes (sent and received).
Top SSID Over The historical SSID (service set identifiers) traffic of authorized WiFi access points on the
Time by Bandwidth network.
WiFi Clients The top WiFi access points on the network by bandwidth/sessions.
IoT
Security Fabric A report showing the security rating details of connected Security Fabric devices. Click a
Rating Report milestone to drill down and hover the cursor over data points to see more details.
Security Fabric The current and historical Security Fabric scores. The Historical Security Fabric Scores pane
Score displays your Security Fabric score over time and how it compares to the industry average
and the industry score range. You can hide the Historical Security Fabric Scores pane.
Security Fabric A topology map showing the logical structure of connected Security Fabric devices.
Topology
Best Practices Overview of the device best practices across regions of North America, Latin America, EMEA,
Overview and APAC.
This dashboard monitors the system performance of the FortiAnalyzer unit running FortiView. It includes the following
widgets:
Insert Rate vs The number of logs received vs the number of logs actively inserted into the database,
Receive Rate including the maximum and minimum rates.
l Receive rate: how many logs are being received.
l Insert rate: how many logs are being actively inserted into the database.
If the insert rate is higher than the log receive rate, then the database is rebuilding. The lag is
the number of logs waiting to be inserted.
CPU & Memory The usage status of the CPU and memory.
Usage
Disk I/O The disk Transaction Rate (I/Os per second), Throughput (KB/s), or Utilization (%). The
Transaction Rate and Throughput graphs also show the maximum and minimum disk activity.
Receive Rate vs The number of logs received vs the number of logs forwarded out, including the maximum and
Forwarding Rate minimum rates.
l Receive rate: how many logs are being received.
Resource Usage Overview of average resource usage history across all devices.
Average
Resource Usage Overview of peak resource usage history across all devices.
Peak
FortiView monitors contain widgets that provide network and security information. Use the controls in the dashboard
toolbar to work with a dashboard.
Time Period Select a time period from the dropdown menu, or set a custom time period.
Dark Mode Enable/disable dark mode. Dark mode shows a black background for the widgets in the
dashboard.
Hide Side-menu or Using the main toolbar, you can hide or show the tree menu on the left. In a typical SOC
Show Side-menu environment, the side menu is hidden and dashboards are displayed in full screen mode.
Use the controls in the widget title bar to work with widgets.
Settings icon Change the settings of the widget. Widgets have settings applicable to that widget, such as
how many of the top items to display, Time Period, Refresh Interval, and Chart Type.
View different chart Some widget settings let you choose different chart types such as the Disk I/O and Top
types Countries widget. You can add these widgets multiple times and set each widget to show a
different chart type.
Hide or show a For widgets that show different data types, click a data type in the title bar to hide or show that
data type data type in the graph.
For example, in the Insert Rate vs Receive Rate widget, click Receive Rate or Insert Rate in
the title bar to hide or show that data. In the Disk I/O widget, click Read or Write in the title bar
to hide or show that data type.
View more details Hover the cursor over a widget’s data points to see more details.
View a narrower Some widgets have buttons below the graph. Click and drag the buttons to view a narrower
time period time period.
Zoom in and out For widgets that show information on a map such as the Top Threat Destinations widget, use
the scroll wheel to change the zoom level. Click and drag the map to view a different area.
You can add any widget to a custom or predefined dashboard. You can also move, resize, or remove widgets. You
cannot rename or delete a predefined dashboard. To reset a predefined dashboard to its default settings, open the
dashboard and click Edit Layout > Reset Layout.
To create a dashboard:
To add a widget:
1. Select the predefined or custom dashboard where you want to add a widget.
2. Click Add Widget to see a list of available widgets. Select the widget(s) you would like to add.
Some widgets can only be added when their corresponding log type is enabled in the ADOM, for example, the Top
Threats widget requires that Traffic logs are enabled. Widgets that cannot be added appear in gray and include an
information icon indicating what logs must be present in the ADOM before the widget can be added to the
dashboard.
3. When you have finished adding widgets, click Save Changes to close the Add Widget pane.
Custom widgets can be created and added to custom dashboards in FortiView > Monitors.
1. Go to FortiView > Custom View and select a previously configured custom dashboard.
2. Click Add Widget.
For information on creating and managing dashboards, see Customizing the monitors dashboard on page 129
3. Scroll to the Custom Widgets field and click Add Widget.
The Custom Widget Dashboard opens.
4. Configure the following information for your widget.
Data Source Select a data source for the widget. The following data sources are available:
l soc-sources
l soc-destinations
l soc-threats
l soc-sdwan-stats
Chart Type Choose how the data is presented in the widget from one of the following options:
l Bar Chart
l Line Chart
l Pie Chart
l Donut Chart
X Axis Select the source type for the X axis. The sources available for selection depend on the
data source selected.
Y Axis Select the source type for the Y axis. The sources available for selection depend on the
data source selected.
Y Axis is only available when the chart type is Bar or Line.
Category Select the data category. The categories available for selection depend on the data
source selected.
Category is only available when the chart type is Pie or Donut.
Value Select the data value. The values available for selection depend on the data source
selected.
Value is only available when the chart type is Pie or Donut.
Show Top Select the number of results that are displayed in the widget.
Options include the top 10, 20, 50, and 100 results.
The FortiAnalyzer FortiView module can be disabled for performance tuning through the CLI. When disabled, the GUI
will hide FortiView and stop background processing for this feature.
When rebuilding the SQL database, Log View is not available until the rebuild is complete.
Click the Show Progress link in the message to view the status of the SQL rebuild.
When ADOMs are enabled, each ADOM has its own information displayed in Log View.
Log View > Logs > All / Fortinet Logs can display the real-time log or historical (Analytics) logs.
Log View > Logs > Log Browse can display logs from both the current, active log file and any compressed log files.
For more information, see Analytics and Archive logs on page 42.
FortiAnalyzer can collect logs from the following device types: FortiADC, FortiAnalyzer, FortiAuthenticator, FortiCache,
FortiCarrier, FortiCASB, FortiClient, FortiDDoS, FortiDeceptor, FortiEDR, FortiGate, FortiIsolator, FortiMail,
FortiManager, FortiNAC, FortiNDR, FortiPAM, FortiProxy, FortiSandbox, FortiSOAR, FortiWeb, and Syslog servers.
Following is a description of the types of logs FortiAnalyzer collects from each type of device:
Fabric Normalized
FortiAuthenticator Event
FortiGate Traffic
Security: Antivirus, Intrusion Prevention, Application Control, Web Filter, File Filter, DNS,
Data Loss Prevention, Email Filter, Web Application Firewall, Vulnerability Scan, VoIP,
FortiClient
Event: Endpoint, HA, Compliance, System, Router, VPN, User, WAN Opt. & Cache, WiFi
File Filter logs are sent when the File Filter sensor is enabled in the
FortiOS Web Filter profile. You can enable the File Filter sensor in
FortiOS at Security Profiles > Web Filters.
FortiDeceptor Event
When VDOMs are used to divide FortiMail into two or more virtual units,
cross-log searches display correlated log data from FortiMail’s VDOMs,
including those assigned to different ADOMs. VDOM results are
included only when performing the cross-log search through FortiMail's
History log view, but results include correlated data for all available log
types (History, Events, Antivirus, and Email Filter).
FortiManager Event
FortiNAC Event
FortiPAM Data Loss Prevention, Event, Protocol, Secret, SSH, Traffic, Antivirus, Zero-Trust Network
Access
FortiSOAR Event
FortiToken Event
You can view a subset of FortiWEB packet logs which contain additional
HTTP request information. See Viewing message details on page 136.
Syslog Generic
The logs displayed on your FortiAnalyzer depends on the device type logging to it and the
enabled features.
ADOMs must be enabled to support non-FortiGate logging. In a Security Fabric ADOM, all
device logs are displayed.
Traffic logs
Traffic logs record the traffic flowing through your FortiGate unit. Since traffic needs firewall policies to properly flow
through FortiGate, this type of logging is also called firewall policy logging. Firewall policies control all traffic attempting to
pass through the FortiGate unit, between FortiGate interfaces, zones, and VLAN sub-interfaces.
ZTNA logs: FortiAnalyzer syncs unified ZTNA logs with FortiGate. ZTNA logs are a sub-type of FortiGate traffic logs,
and can be viewed in Log View > FortiGate > Traffic. You can filter for ZTNA logs using the sub-type filter and optionally
create a custom view for ZTNA logs. See Custom views on page 146.
Security logs
Security logs (FortiGate) record all antivirus, web filtering, file filtering, application control, intrusion prevention, email
filtering, data loss prevention, vulnerability scan, and VoIP activity on your managed devices.
DNS logs
DNS logs (FortiGate) record the DNS activity on your managed devices.
Event logs
Event logs record administration management and Fortinet device system activity, such as when a configuration
changes, or admin login or HA events occur. Event logs are important because they record Fortinet device system
activity which provides valuable information about how your Fortinet unit is performing. FortiGate event logs includes
System, Router, VPN, User, and WiFi menu objects to provide you with more granularity when viewing and searching
log data.
Application Logs
Application logs record playbook and incident activity on FortiAnalyzer. Logs are generated and stored separately for
each ADOM. Application logs can only be viewed on the local FortiAnalyzer.
Fabric logs are a licensed feature that enables FortiAnalyzer's SIEM capabilities to parse, normalize, and correlate logs
from Fortinet products as well as security event logs of Windows and Linux hosts (with Fabric Agent integration). When
licensed, parsing is predefined by FortiAnalyzer and does not require manual configuration by administrators.
A SIEM database is automatically created for Fabric ADOMs once a SIEM license has been
applied to FortiAnalyzer and Fabric devices begin logging. Past logs and imported log files are
not included in the SIEM database.
Log messages
You can find FortiMail and FortiWeb logs in their default ADOMs.
You can display the log details pane below the message list by clicking the Bottom icon in the log details pane.
When the log details pane is displayed below the message list, you can move it to the right of the log message list by
clicking the Right icon. This is sometimes referred to as docking the pane to the bottom or right of the screen.
The log details pane provides shortcuts for adding or replacing filters and for showing or hiding a column. Right-click a
log field to select an option.
If the log message contains UTM logs, you can click the UTM log icon in the log details pane to
open the UTM log view window.
If the log message contains IPS signature information, you can click the IPS signature link
under Attack Name to view the IPS Signature details in a dialog window.
1. Go to Log View > Logs > Fortinet Logs, and select the FortiWeb device type.
2. From the log type dropdown, select Attack log.
The Device icon is also available in the Data column. To display the column, click More
Columns, and select Data from the dropdown.
You can set packet capture (PCAP) files to download from FortiAnalyzer encrypted and/or in ZIP format.
By default, PCAP files are downloaded in ZIP format. To adjust this setting, use the following command in the
FortiAnalyzer CLI:
config system log pcap-file
set download-mode {plain | zip | zip-with-password}
end
You can download archive files from logs via the FortiAnalyzer GUI in the log detail panel. The below example
demonstrates how to download a PCAP file that is encrypted in ZIP format.
1. In the FortiAnalyzer CLI, set the pcap-file download mode to zip-with-password:
config system log pcap-file
set download-mode zip-with-password
end
2. In the FortiAnalyzer GUI, go to Log View and double-click a log containing an archive file.
3. In the Data section, click the download icon for the Archive field.
The file is downloaded and the password displays in the FortiAnalyzer GUI. You can copy the password, as needed.
To unlock the downloaded file, if appropriate, you must use the password.
The columns displayed in the log message list can be customized and reordered as needed.
1. In the table header of the log message list view, click the Column Settings icon and select a column to hide or
display.
The available columns vary depending on the device and log type.
2. To reset to the default columns, click Reset to Default.
3. To add other columns, click More Columns. In the Column Settings dialog, select the columns to show or hide.
4. Click OK.
You can also add or remove a log field column in the log details pane, by right-clicking a
log field and selecting Add [log field name] or Remove [log field name].
Place the cursor in the column title and move a column by drag and drop.
In Log View, you can select the columns that are displayed as the default. In Log View > Logs for the appropriate device
type and log type, click More Columns to set the columns for the table. Then, click Save as Default. For more
information, see Customizing displayed columns on page 138.
Customizing the default column view can only be done on a Super_User administrator profile.
Default column customization is applied per devtype/logtype across all ADOMs.
The GUI displays columns based on the following order of priority:
1. Displays the user’s column customizations (if defined).
2. Displays the default columns set by the Super_User administrator (if defined).
3. Displays the system default columns.
Customized default column configuration is preserved during upgrades.
To reset default columns to the system default, deselect all columns from the Column Settings
selection menu and then select Set as Default.
Filtering messages
You can apply filters to the message list. Filters are not case-sensitive by default. If available, select Tools > Case
Sensitive Search to create case-sensitive filters.
Filter mode search In the Add Filter box, click the plus icon and select a filter from the dropdown
list. Then select an operator (=, !=, <, >, >=, <=, ~, or !~) and type a value for
the filter. Click Apply to add the filter.
Click the plus icon again to add another filter. It will be added with an AND
relationship to the previous filter. You can click the operator in the Add Filter
box to toggle between AND and OR, or click a filter to edit the value.
When adding a filter, only displayed columns are available in the dropdown
list.
Switching between filter At the right end of the Add Filter box, click the Switch to text mode icon to
mode search and text mode switch to a text mode search. When in text mode search, click the Switch to
search filter mode icon to switch to a filter mode search.
Text mode search In text mode search, enter the search criteria (log field names, operators, and
values).
Search operators and syntax Click the help icon at the right end of the Add Filter box to view search
operators and syntax. See also Filter search operators and syntax on page
142.
CLI string “freestyle” search Searches the string within the indexed fields configured using the CLI
command: config ts-index-field.
For example, if the indexed fields have been configured using these CLI
commands:
config system sql
config ts-index-field
edit "FGT-traffic"
set value "app,dstip,proto,service,srcip,user,utmaction"
next
end
end
Then if you type “Skype” in the Add Filter box, FortiAnalyzer searches for
“Skype” within these indexed fields:
app,dstip,proto,service,srcip,user and utmaction.
You can combine freestyle search with other search methods, for example:
Skype user=David.
2. In the toolbar, make other selections such as devices, time period, which columns to display, and more.
UUID logging must be enabled in FortiGate/FortiOS to filter FortiGate traffic logs by object
name, including Source Object and Destination Object. See the
FortiGate/FortiOS Administration Guide for more information about UUID logging.
In the log message table view, right-click an entry to select a filter criteria from the menu. Depending on the column you
right-clicked, Log View uses the column value as the filter criteria. This context-sensitive filter is only available for certain
columns.
You can perform the following filter actions from the right-click menu:
l Add a filter entry with an AND condition, such as AND event_type=traffic
l Add a filter entry with an AND negate condition, such as AND event_type!=traffic
l Add a filter entry with an OR condition, such as OR event_type=traffic
l Add a filter entry with an OR negate condition, such as OR event_type!=traffic
l Replace all filters with the selected entry, such as event_type=utm
l Replace all filters with the selected negate, such as event_type!=utm
If no filter is used before right-click filtering, the new filter will be added no matter which option is selected in the right-click
menu.
To see log field name of a filter/column, right-click the column of a log entry and select a
context-sensitive filter. The Add Filter box shows log field name.
Context-sensitive filters are available for each log field in the log details pane. See Viewing
message details on page 136.
For Log View windows that have an Action column, the Action column displays smart information according to policy (log
field action) and utmaction (UTM profile action).
The Action column displays a green checkmark Accept icon when both policy and UTM profile allow the traffic to pass
through, that is, both the log field action and UTM profile action specify allow to this traffic.
The Action column displays a red X Deny icon and the reason when either the log field action or UTM profile action deny
the traffic.
If the traffic is denied due to policy, the deny reason is based on the policy log field action.
If the traffic is denied due to UTM profile, the deny reason is based on the FortiView threattype from craction.
craction shows which type of threat triggered the UTM action. The threattype, craction, and crscore fields are
configured in FortiGate in Log & Report. For more information, see the FortiOS - Log Message Reference in the Fortinet
Document Library.
A filter applied to the Action column is always a smart action filter.
The smart action filter uses the FortiGate UTM profile to determine what the Action column
displays. If the FortiGate UTM profile has set an action to allow, then the Action column will
display that line with a green Accept icon, even if the craction field defines that traffic as a
threat. The green Accept icon does not display any explanation.
In the scenario where the craction field defines the traffic as a threat but the FortiGate UTM
profile has set an action to allow, that line in the Log View Action column displays a green
Accept icon. The green Accept icon does not display any explanation.
And Find log entries containing all the search terms. Connect the terms with a space
character, or “and”. Examples:
1. user=henry group=sales
2. user=henry and group=sales
Or Find log entries containing any of the search terms. Separate the terms with “or”
or a comma “,”. Examples:
1. user=henry or srcip=10.1.0.15
2. user=henry,linda
Not Find log entries that do NOT contain the search terms. Add “-” before the field
name. Example:
-user=henry
>, < Find log entries greater than or less than a value, or within a range. This operator
only applies to integer fields. Example:
policyid>1 and policyid<10
IP subnet, range, subnet list Find log entries within a certain IP subnet, IP range, subnet list, or subnet group.
search Examples:
1. srcip=192.168.1.0/24
2. srcip=10.1.0.1-10.1.0.254
3. srcip=SubnetGrp_Name_A
4. srcip=Subnet_Name_A
To create a subnet list or subnet group, see Subnets on page 168.
Wildcard search You can use wildcard searches for all field types. Examples:
1. srcip=192.168.1.*
2. policyid=1*
3. user=*
For FortiClient endpoints registered to FortiGate devices, you can filter log messages in FortiGate traffic log files that are
triggered by FortiClient.
1. Go to Log View > Logs > Fortient Logs > FortiGate > Traffic.
2. In the Add Filter box, type fct_devid=*. A list of FortiGate traffic logs triggered by FortiClient is displayed.
3. In the message log list, select a FortiGate traffic log to view the details.
4. Click the FortiClient tab, and double-click a FortiClient traffic log to see details.
The FortiClient tab is available only when the FortiGate traffic logs reference FortiClient traffic logs.
Threat Hunting
The Threat Hunting pane offers a SOC analytics dashboard using the SIEM database. Threat Hunting uses cached data
to allow SOC analysts to quickly drilldown on logs in fields of interest. To view the Threat Hunting dashboard, go to Log
View > Logs > Threat Hunting. The Threat Hunting dashboard includes a log count chart and SIEM log analytics table.
The Threat Hunting dashboard is only available in Fabric ADOMs when ADOMs are enabled.
To change the displayed time range, select a time from the dropdown in the top-left corner of the dashboard. You can
configure custom time ranges by selecting either Last N Minutes, Last N Hours, or Last N Days. Apply filters to the
dashboard using Add Filter or by selecting an item in the table and clicking Add to Hunting. Only logs matching the
selected time range and filter are displayed in the SIEM log analytics table.
A chart displaying the total log count during the specified time range is presented at the top of the Threat Hunting
dashboard.
You can zoom in and out on the displayed time range by using your mouse's scroll wheel or by adjusting the timebar
below the graph. You can adjust the time bar by dragging the start and stop bars on either side of the selected time
range, or by clicking and dragging the entire time range to the left or right. Only logs displayed within the time period
visible in the chart are shown in the SIEM log analytics table.
The SIEM log analytics table contains a list of fields of interest in the left menu as well as the analytics table. You can
select a field from the left menu to view corresponding data in the table. The table includes a row for the null value of that
field, if applicable. For example, see the image below where Application Service is blank (null) in row 5.
Double-click an item in the table to open the log drilldown page which displays detailed log information. Alternatively, you
can select an item in the table and click View Logs. A separate pane displays the logs in a table view. This feature
includes the same functions as are available in other panes throughout Log View, including the search bar filter, time
filter, columns settings, right-click filter, and more. See Viewing message details on page 136
Monitoring all types of security and event logs from FortiGate devices
You can monitor all types of security and event logs from FortiGate devices in:
l Log View > Logs > FortiGate > Security > Summary
l Log View > Logs > FortiGate > Event > Summary
All widgets in these dashboards can be filtered by FortiGate device and timeframe in the toolbar. The widgets can be
toggled on/off from the Toggle Widgets dropdown. By clicking an event name in the widget, you can open a list view of
those logs filtered by the devices and timeframe you selected on the dashboard.
The summary dashboard for event logs includes a Total Events widget, which displays a line chart of the event logs by
level. You can hover your cursor over the line chart to display a summary of the count and time at that point. This widget
cannot be toggled off.
By default, Log View displays historical logs. Custom View and Chart Builder are only available in historical log view.
To view real-time logs, in the log message list view toolbar, click More > Real-time Log.
To switch back to historical log view, click More > Historical Log.
By default, Log View displays formatted logs. The log view you select affects available view options. You cannot
customize columns when viewing raw logs.
To view raw logs, in the log message list view toolbar, click More > Raw Log .
To switch back to formatted log view, click More > Formatted Log.
For more information about FortiGate raw logs, see the FortiGate Log Message Reference in the Fortinet Document
Library. For more information about raw logs of other devices, see the Log Message Reference for the platform type.
Custom views
Use Custom View to save the filter setting, device selection, and the time period you have specified.
Custom views can be set as public or private. Public custom views can be viewed by all administrators, whereas private
custom views can only be viewed by the creator. Users cannot make changes to custom views created by other
administrators but can right-click the view and select Save As to copy it.
Option Description
Log Type Displays the log type currently used to filter Log View. This will be used for the
custom view.
Devices Displays the devices currently used to filter Log View. These will be used for
the custom view.
Time Period Displays the time period used to filter the current content pane. This will be
used for the custom view.
> Favorites.
l Private: Only you can see this custom view displayed in Log View
> Favorites.
You can download historical log messages to the management computer as a text or CSV file. You cannot download
real-time log messages.
You can also create charts in Reports > Report Definitions > Chart Library. See Chart library
on page 325
Log View includes a Chart Builder for you to build custom charts for each type of log messages.
Option Description
Columns Select which columns of data to include in the chart based on the log
messages that are displayed on the Log View page.
Time Frame Displays the time frame currently selected in Log View.
5. Once a chart has been created, it can be inserted into a new report. See Reports Editor tab on page 312.
Log information about user and endpoint IDs is available in Log View and can be viewed by configuring these fields as
displayed columns. See Customizing displayed columns on page 138.
UEBA User ID and UEBA Endpoint ID fields with values below 1024 are special cases which are tracked by
FortiAnalyzer's UEBA. See the table below for information on what each value represents.
database rebuilding.
When a device has FortiClient installed and FortiAnalyzer is able to retrieve endpoint
information, all interfaces of this device will belong to a single endpoint with the FCT-UID as
the key. For devices without FortiClient that have multiple NICs, each interface appears as a
separate endpoint.
The User ID and UEBA User ID fields are interchangeable and contain the same information.
The Endpoint ID and UEBA Endpoint ID fields are interchangeable and contain the same
information.
Log groups
You can group devices into log groups. You can view FortiView summaries, display logs, generate reports, or create
event handlers for a log group. Log groups are virtual so they do not have SQL databases or occupy additional disk
space.
When you add a device with VDOMs to a log group, all VDOMs are automatically added.
Option Description
Device Type Select the device type for the log group.
Devices Select the devices to include in the log group, and then click OK.
4. Click OK.
Log browse
When a log file reaches its maximum size or a scheduled time, FortiAnalyzer rolls the active log file by renaming the file.
The file name is in the form of xlog.N.log, where x is a letter indicating the log type, and N is a unique number
corresponding to the time the first log entry was received. For information about setting the maximum file size and log
rolling options, see Device logs on page 402.
Log Browse displays log files stored for both devices and the FortiAnalyzer itself, and you can log in the compressed
phase of the log workflow.
In Collector mode, if you want to view the latest log messages, select the latest log file to
display its log messages.
Imported log files can be useful when restoring data or loading log data for temporary use. For example, if you have older
log files from a device, you can import these logs to the FortiAnalyzer unit so that you can generate reports containing
older data.
Log files can also be imported into a different FortiAnalyzer unit. Before importing the log file you must add all devices
included in the log file to the importing FortiAnalyzer.
To insert imported logs into the SQL database, the config system sql start-time and rebuild-event-
start-time must be older than the date of the logs that are imported and the storage policy for analytic data (the Keep
Logs for Analytics field) must also extend back far enough.
To set the SQL start time and rebuild event start time using CLI commands:
You can download a log file to save it as a backup or to use outside the FortiAnalyzer unit. The download consists of
either the entire log file or a partial log file, as selected by your current log view filter settings and, if downloading a raw
file, the time frame specified.
1. Go to Log View > Logs > Log Browse and select the log file that you want to download.
2. In the toolbar, click Download.
3. In the Download Log File(s) dialog, configure download options:
l In the Log file format dropdown list, select Native, Text, or CSV.
l If you want to compress the downloaded file, select Compress.
4. Click Download.
Logs and files are stored on the FortiAnalyzer hard disks. Logs are also temporarily stored in the SQL database.
When a SIEM license is added, a SIEM database is created to store normalized Fabric logs.
When ADOMs are enabled, settings can be specified for each ADOM that apply only to the devices in it. When ADOMs
are disabled, the settings apply to all managed devices.
Data policy and disk utilization settings for devices are collectively called log storage settings. Global log and file storage
settings apply to all logs and files, regardless of log storage settings (see File Management on page 406). Both the global
and log storage settings are always active.
The log rate and log volume per ADOM can be viewed through the CLI using the following
commands:
diagnose fortilogd lograte-adom <name>
diagnose fortilogd logvol-adom <name>
On the FortiAnalyzer, the system reserves 5% to 20% of the disk space for system usage and unexpected quota
overflow. The remaining 80% to 95% of the disk space is available for allocation to devices.
Reports are stored in the reserved space.
Small Disk (up to 500GB) The system reserves either 20% or 50GB of disk space, whichever is smaller.
Medium Disk (up to 1TB) The system reserves either 15% or 100GB of disk space, whichever is smaller.
Large Disk (up to 3TB) The system reserves either 10% or 200GB of disk space, whichever is smaller.
Very Large Disk (5TB and The system reserves either 5% or 300GB of disk space, whichever is smaller.
higher)
The RAID level you select determines the disk size and the reserved disk quota level. For
example, a FortiAnalyzer 1000C with four 1TB disks configured in RAID 10 is considered a
large disk, so 10%, or 100GB, of disk space is reserved.
When devices send logs to a FortiAnalyzer unit, the logs enter the following workflow automatically:
1. Compressed logs are received and saved in a log file on the FortiAnalyzer disks.
When a log file reaches a specified size, FortiAnalyzer rolls it over and archives it, and creates a new log file to
receive incoming logs. You can specify the size at which the log file rolls over. See Device logs on page 402.
In the indexed phase, logs are indexed in the database for a specified length of time so they can be used for analysis.
Indexed, or Analytics, logs are considered online, and details about them can be used viewed in the FortiView, Log View,
and Incidents & Events panes. You can also generate reports about the logs in the Reports pane.
In the compressed phase, logs are compressed and archived in FortiAnalyzer disks for a specified length of time for the
purpose of retention. Compressed, or Archived, logs are considered offline, and their details cannot be immediately
viewed or used to generate reports.
The following table summarizes the differences between indexed and compressed log phases:
Indexed Compressed in log file and Yes. Logs are available for analytic use in FortiView,
indexed in database Incidents & Events, and Reports.
Automatic deletion
Logs and files are automatically deleted from the FortiAnalyzer unit according to the following settings:
l Global automatic file deletion
File management settings specify when to delete the oldest Archive logs, quarantined files, reports, and archived
files from disks, regardless of the log storage settings. For more information, see File Management on page 406.
l Data policy
Data policies specify how long to store Analytics and Archive logs for each device. When the specified length of time
expires, Archive logs for the device are automatically deleted from the FortiAnalyzer device's disks.
l Disk utilization
Disk utilization settings delete the oldest Archive logs for each device when the allotted disk space is filled. The
allotted disk space is defined by the log storage settings. Alerts warn you when the disk space usage reaches a
configured percentage.
When log trimming is performed by disk quota enforcement, tables from both the SQL and
SIEM databases are considered together, and the oldest table, identified by the timestamp
of logs inside, is trimmed. The process repeats until the quota is within the defined
threshold. The SIEM database is always partitioned by day, whereas the size of the SQL
database partition can be configured in FortiAnalyzer settings. For information on SIEM
logs, see Types of logs collected for each device on page 133.
All deletion policies are active on the FortiAnalyzer unit at all times, and you should carefully configure each policy. For
example, if the disk fullness policy for a device hits its threshold before the global automatic file deletion policy for the
FortiAnalyzer unit, Archive logs for the affected device are automatically deleted. Conversely, if the global automatic file
deletion policy hits its threshold first, the oldest Archive logs on the FortiAnalyzer unit are automatically deleted
regardless of the log storage settings associated with the device.
The following table summarizes the automatic deletion polices:
Global automatic file All logs, files, and When the specified length of time expires, old files are automatically
deletion reports on the deleted. This policy applies to all files in the system regardless of the
system data policy settings associated with devices.
Data policy Logs for the device When the specified length of retention time expires, old Archive logs
with which the data for the device are deleted. This policy affects only Archive logs for the
policy is associated device with which the data policy is associated.
Disk utilization Logs for the device When the specified threshold is reached for the allotted amount of
with which the log disk space for the device, the oldest Archive logs are deleted for the
storage settings are device. This policy affects only Archive logs for the device with which
associated the log storage settings are associated.
When you delete one or more devices from FortiAnalyzer, the raw log files and archive packets are deleted, and the
action is recorded in the local event log. However, the logs that have been inserted into the SQL database are not
deleted from the SQL database. As a result, logs for the deleted devices might display in the Log View and FortiView
panes, and any reports based on the logs might include results.
The following are ways you can remove logs from the SQL database for deleted devices.
l Rebuild the SQL database for the ADOM to which deleted devices belonged or rebuild the entire SQL database.
l Configure the log storage policy. When the deleted device logs are older than the Keep Logs for Analytics setting,
they are deleted. Also, when analytic logs exceed their disk quota, the SQL database is trimmed starting with the
oldest database tables. For more information, see Configuring log storage policy on page 157.
l Configure global automatic file deletion settings in System Settings > Advanced > File Management. When the
deleted device logs are older than the configured setting, they are deleted. For more information, see File
Management on page 406.
File Management configures global settings that override other log storage settings and
apply to all ADOMs.
To view log storage information and to configure log storage policies, go to System Settings > ADOMs.
If ADOMs are enabled, you can view and configure the data policies and disk usage for each ADOM.
The log storage policy affects only the logs and databases of the devices associated with the log storage policy. Reports
are not affected. See Disk space allocation on page 152.
The following options are available:
Option Description
Create New Create a new ADOM. This option is only available when ADOMs are enabled.
View Storage Info View the storage usage, analystics policy, and archive policy.
Delete Delete the ADOM. You can only delete empty ADOMs.
Enable ADOM Enable the ADOM feature. For more information, see Administrative Domains (ADOMs)
on page 364.
Disable ADOM Disable the ADOM. This option is only available when ADOMs are enabled.
Collapse Devices / Collapse or expand the list of devices in the table view.
Expand Devices
Search Enter a search term to search the list. You can toggle match case and regular
expression for the search, as needed.
Column Description
Devices The devices currently in the ADOM. You can expand the list of devices in the row and
click to View Details in a separate pane.
Analytics The age, in days, of the oldest Analytics logs (Actual Days), and the number of days
(Actual/Config Days) Analytics logs will be kept according to the data policy (Config Days).
Archive The age, in days, of the oldest Archive logs (Actual Days) and the number of days
(Actual/Config Days) Archive logs will be kept according to the data policy (Config Days).
Analytics Usage How much disk space Analytics logs have used, and the maximum disk space allotted
(Used/Max) for them.
Archive Usage How much disk space Archive logs have used and the maximum disk space allotted for
(Used/Max) them.
Storage information
To view log storage policy and statistics, go to System Settings > ADOMs, select an ADOM, and click View Storage Info.
There are two sections for the logs storage information:
l Analytics logs
l Archive logs
Each section includes a policy diagram to visualize the quota used and a details graph to view the usage over time.
The policy diagrams show the percentage of the disk space quota that is used. Mouse over the diagram to view the used,
free, and total allotted disk space. The configured length of time that logs are stored is also shown.
The graphs show the amount disk space used over time. Enable Max Line to show a line on the graph for the total space
allotted. Mouse over the graph to view the used and available disk space at that date and time. Click the graph to view a
breakdown of the disk space usage by device.
When the used quota approaches 100 percent, a warning message displays when accessing the Storage Statistics
pane.
Click Configure Now to open the Edit Log Storage Policy dialog where you can adjust log storage policies to prevent
running out of allocated space (see Configuring log storage policy on page 157), or click Remind Me Later to resolve the
issue another time.
The log storage policy affects the logs and databases of the devices associated with the log storage policy.
If you change log storage settings, the new date ranges affect Analytics and Archive logs
currently in the FortiAnalyzer device. Depending on the date change, Analytics logs might be
purged from the database, Archive logs might be added back to the database, and Archive
logs outside the date range might be deleted.
Data Policy
Keep Logs for Specify how long to keep Archive logs. Make sure your setting meets your
Archive organization’s regulatory requirements.
If set to 0, the Archive logs will be deleted after rolling. Note that the rolled log
files will be kept until the next retention policy check, which occurs every
twelve hours.
Disk Utilization
Allocated Specify the amount of disk space allotted. See also Disk space allocation on
page 152.
Analytics: Archive Specify the disk space ratio between Analytics and Archive logs. Analytics
logs require more space than Archive logs. Select Modify to change the
setting.
Alert and Delete Specify the percentage of allotted disk space usage that will trigger an alert
When Usage messages and start automatically deleting logs. The oldest Archive log files or
Reaches Analytics database tables are deleted first.
You can manually configure log rate limits for devices in an ADOM or for specific logging devices. By default, no rate limit
is enforced.
When setting the log rate limit to manual in the CLI, you can specify a default device log rate and a per device/ADOM
rate. Both a default and per device limit can be set simultaneously, in which case the per device limit will take priority for
configured devices.
You can view configured logging rates in the CLI using the following command: diagnose test application
fortilogd 17 and diagnose test application oftpd 17.
The Fabric View module enables you to view assets and create subnets. The Fabric View tab is available in version 6.0
ADOMs and later.
This section contains the following topics:
l Asset Identity Center on page 160
l Subnets on page 168
The Fabric View > Asset Identity Center is the central location for security analysts to view endpoint and user information
to make sure they are compliant. Endpoints are important assets in a network as they are the main entry points in a
cybersecurity breach.
The asset information is useful for the following:
l Incident response: check assets that are infected or vulnerable as part of your SOC analysis and incident
response process.
l Compliance: identify unknown and non-compliant users and endpoints.
The Asset Identity Center is also useful for user and endpoint mapping. Some users might use multiple endpoints in the
network, endpoints might use multiple different interfaces to connect, network interfaces might have multiple IP
addresses, and so on. A map of users and their endpoints gives you better visibility when you analyze logs, events, and
incidents. This also helps with your reporting.
This topic includes the following information:
l Asset Summary on page 160
l Identity Summary on page 162
l Asset List on page 163
l Identity List on page 164
l OT View on page 166
l Configuring endpoint and end user data sources on page 167
Asset Summary
The Asset dashboard in Fabric View > Asset Identity Center > Summary includes widgets for analysis of endpoints.
You can click Toggle Widgets to select which widgets are visible on the dashboard, and refine the list of endpoints
included in the widgets by using the dashboard filter. You can also apply filters from some widgets.
By default, the following widgets are displayed in the dashboard:
Identification/Unidentified Displays the number of detected endpoint assets that are identified and
Asset unidentified.
Identified Active Asset Displays identified asset visibility over the past 24 hours to 52 weeks.
Identified Activity Timeline Displays a first seen, last update, and last seen identified asset activity timeline.
Click the settings icon to adjust the time filter or disable/enable the refresh
interval.
Unidentifed Active Asset Displays unidentified asset visibility over the past 24 hours to 52 weeks.
Unidentifed Activity Timeline Displays a first seen, last update, and last seen unidentified asset activity timeline.
Click the settings icon to adjust the time filter or disable/enable the refresh
interval.
1. Go to Fabric View > Asset Identity Center > Summary, and select Asset.
2. Click the settings icon in the top-right corner of the pane.
The following options are displayed.
Tags Filter Select Include or Exclude, and select a tag from the Tags Field dropdown.
You can click the add icon next to the tags field to add additional items to be
included or excluded. Click the trash icon to remove a field.
Hardware\OS Select a hardware/OS type from the dropdown to only display endpoints with
the matching hardware or operating system type.
Detect Method Select a detection method in the dropdown to only display endpoints that were
detected by the specified method.
3. Click OK.
Identity Summary
The Identity dashboard in Fabric View > Asset Identity Center > Summary includes widgets for analysis of end users.
You can click Toggle Widgets to select which widgets are visible on the dashboard, and refine the list of endpoints
included in the widgets by using the dashboard filter. You can also apply filters from some widgets.
By default, the following widgets are displayed in the dashboard:
Number of Active Users Displays user visibility data over the past 24 hours to 52 weeks.
1. Go to Fabric View > Asset Identity Center > Summary and select Identity.
2. Click the settings icon in the top-right corner of the pane.
The following options are displayed.
3. Click OK.
Asset List
To open the Asset List, go to Fabric View > Asset Identity Center > Asset Identity List > Asset List and select Asset in the
top-right corner of the pane.
This table view lists all endpoints and users from relevant logs and correlates them with FortiAnalyzer modules. Sort by
the Vulnerabilities column to see which endpoints and users have the highest vulnerabilities.
The following default columns are available in the table:
Column Description
Tags Tags are used to group and identify assets to assist SOC analysts with incident management
and prioritization.
Tags can be defined by FortiClient EMS or when creating subnets and subnet groups in
FortiAnalyzer.
FortiClient EMS tags are determined based on the Classification Tag assigned in FortiClient
EMS. Tags are displayed in the Asset Center when a playbook retrieves information about
that endpoint using the Get Endpoints task available with a FortiClient EMS connector. See
Configuring connectors for automation on page 251.
Subnet tags are configurable when creating new subnets and subnet groups in FortiAnalyzer.
See Subnets on page 168.
User The name of the user. Click the name to view the corresponding user information in the
Identity Center pane.
IP Address IP address the endpoint is connected to. A user might be connected to multiple endpoints.
Software Click Details to view information about software installed on an endpoint when available.
Endpoint software information is retrieved when a playbook runs the Get Software Inventory
action using the FortiClient EMS connector. See Automation on page 249.
Vulnerabilities The number of vulnerabilities for critical, high, medium, and low vulnerabilities. Click the
vulnerability to view the name and category. Right-click the vulnerability to view available on-
demand actions using a security fabric connector.
Endpoint vulnerability information is retrieved when a playbook runs the Get Vulnerabilities
action using the FortiClient EMS connector. See Automation on page 249.
Last Update The date and time the log was updated.
If there is no FortiClient in your installation, then endpoint and end user information is limited.
l Endpoints are detected based on MAC address and displayed by IP address instead of
host name.
l User related information might not be available.
l Detailed information such as OS version, avatar, and social ID information are not
available.
1. In the toolbar, click the column settings icon, and select the columns you want to display.
2. Click Custom View > Save As Custom View. The Save as New Custom View dialog is displayed.
3. In the Name field, enter a name for the custom view, and click OK. The view is saved under Fabric View > Asset
Identity Center > Custom View.
1. Click Download.
Identity List
To open the Identity List, go to Fabric View > Asset Identity Center > Asset Identity List > Asset List and select Identity in
the top-right corner of the pane.
This table lists all endpoints and users from relevant logs and correlates them with FortiAnalyzer modules.
Column Description
l PKI user account with digital client authentication certificate stored on the FortiGate unit
l RADIUS, LDAP, or TACACS+ server, optionally specifying particular user groups on that
server
l User group defined on an FSSO server.
Column Description
Endpoints Endpoint host name, IP address, or MAC address. A user may be connected to multiple
endpoints.
Click the endpoint to display the corresponding user information in the Assets pane.
Social The user's Name, Picture, Email, Phone Number, and Social if it is available.
Last Update The date and time the log was updated.
host name.
l User related information might not be available.
l Detailed information such as OS version, avatar, and social ID information are not
available.
1. In the toolbar, click the column settings icon, and select the columns you want to display.
2. Click Custom View > Save As Custom View. The Save as New Custom View dialog is displayed.
3. In the Name field, enter a name for the custom view, and click OK. The view is saved under Fabric View > Asset
Identity Center > Custom View.
1. Click Download.
OT View
The Fabric View > Asset Identity Center > Asset Identity List > OT View displays the relationships between endpoints,
allowing you to analyze the structure.
The following actions are available in the toolbar:
Option Description
Lock/Unlock View Lock or unlock the endpoints. After unlocking, the device can move only in parallel at the level.
1. In the toolbar, click the column settings icon, and select the columns you want to display.
2. Click Custom View. The Save as New Custom View dialog is displayed.
3. In the Name field, enter a name for the custom view, and click OK. The view is saved under Fabric View > Asset
Identity Center > Custom View.
You can configure the data sources used in the Fabric View > Asset Identity Center > Asset Identity List to specify which
sources are used to identify endpoints and end users. Data source modification is configured per ADOM.
The following data sources are configurable in FortiAnalyzer:
FortiGate Log By default, the log identification of endpoints and end users is enabled for all
devices and subnets. You can create rules to specify which FortiGate devices and
which subnets are excluded in the data source.
Set the status to OFF to disable UEBA identification on the specified devices or all
devices.
FortiClient Log By default, the log identification of endpoints and end users is enabled for all
devices. You can create rules to specify which FortiClient devices are excluded in
the data source.
Set the status to OFF to disable identification of endpoints and end users from the
specified devices or all devices.
FortiMail Log By default, the log identification of endpoints and end users is disabled for all
devices. You can create rules to specify which FortiMail devices and domains are
included in the data source.
FortiWeb Log By default, the log identification of endpoints and end users is enabled for all
devices. You can create rules to specify which FortiWeb devices and which
subnets are excluded in the data source.
Set the status to OFF to disable UEBA identification on the specified devices or all
devices.
FortiNAC Log By default, the log identification of endpoints and end users is enabled for all
devices. You can create rules to specify which FortiNAC devices and which
subnets can be excluded in the data source.
Set the status to OFF to disable UEBA identification on the specified devices or all
devices.
EMS Connector By default, the log identification of endpoints and end users is disabled for all EMS
connectors. You can create rules to specify which EMS connectors can be
included in the data source.
Rules created for individual devices have priority over those created for "all devices".
You can configure the same data source multiple times when the device or connector is
unique. When a conflict arises, you will see a message indicating the data source for that
device already exists, and you will have the option to override the existing data source.
1. Go to Fabric View > Asset Identity Center > Asset Identity List, and click More > Data Sources.
The Data Source Selection dialog opens. You can create, edit, and delete data sources in this dialog.
2. To create a new data source, click Create New.
The Data Source Selection wizard opens.
3. Configure your data source. Different fields appear for different data source types:
Data Source Select the data source that you want to configure.
Data sources include FortiGate Log, FortiClient Log, FortiMail Log, FortiWeb
Log, FortiNAC Log, and EMS Connector.
Depending on your selection, different configurable fields will appear below.
Status Enable or disable the data source by setting the Status to ON or OFF.
When the data source is disabled, FortiAnalyzer will not identify endpoints and
end users in this ADOM from the devices, domains, or connectors configured
in the data source.
Devices Devices is only available when the data source is FortiGate Log, FortiClient
Log, FortiMail Log, FortiWeb Log, or FortiNAC Log.
Select All Devices or Specify to select individual devices.
Exclude Subnets Exclude Subnets is only available when the data source is FortiGate Log,
FortiWeb Log, or FortiNAC Log.
Select subnets to be excluded from the data source selection. You can create
subnets in Fabric View > Fabric > Subnets. See Subnets on page 168.
Include Domains Include Domains is only available when the data source is FortiMail Log.
Enter domains to be included in the data source selection.
Connectors Connectors is only available when the data source is EMS Connector.
Select an EMS connector to be included in the data source selection. See
Security Fabric connectors on page 256.
Subnets
In Fabric View > Subnets, you can define subnet lists which can be added to subnet groups.
Subnet lists and groups can be used to create include and exclude lists in event handlers and reports.
You can filter for subnet lists and subnet groups in Log View. See Filtering messages on page 139.
Creating, updating, or deleting subnets will generate local event logs.
Subnets includes the following options in the toolbar and right-click menu:
Subnet filtering for event handlers is supported in FortiGate, FortiWeb, FortiMail, and Fabric
ADOMs.
l IP Range
l Batch Add
5. Enter any Tags to be associated with this subnet. Tags are displayed in Assets when the endpoint IP falls within the
subnet. SeeAsset List on page 163.
6. Optionally, enter a description.
7. Click OK.
Once a subnet has been created, it can be edited, cloned, or deleted by highlighting it and selecting the
corresponding action in Subnet List toolbar.
You can streamline SOC processes by defining a subnet allowlist/blocklist for event handlers. These addresses can be
linked to any event handler through a data selector, enabling or preventing the selected subnets from triggering an
event. Creating a subnet allowlist/blocklist in data selectors eliminates the need to specify common networks in every
event handler.
If a conflict arises between the exclude and include lists, the exclude list will take priority.
Subnet filters work when either SRCIP or DSTIP hit the subnet, meaning SRCIPs and DSTIPs
share the same subnet filters.
FortiAnalyzer can recognize a Security Fabric group of devices and display all units in the group on the Device Manager
pane. See Adding a Security Fabric group on page 173. FortiAnalyzer supports the Security Fabric by storing and
analyzing the logs from the units in a Security Fabric group as if the logs are from a single device. You can also view the
logging topology of all units in the Security Fabric group for additional visibility. See Displaying Security Fabric topology
on page 174.
FortiAnalyzer provides dynamic data and metadata exchange with the Security Fabric and uses the data in FortiView
and Reports for additional visibility. A default report template lets you monitor new users, devices, applications,
vulnerabilities, threats and so on from the Security Fabric.
A set of dashboard widgets lets you review audit scores for a FortiGate Security Fabric group with recommended best
practices and historical audit scores and trends.
If FortiClient is installed on endpoints for endpoint control with FortiGate, you can use the endpoint telemetry data
collected by the Security Fabric agent to display user profile photos in reports and FortiView.
Before you can add a Security Fabric group to FortiAnalyzer, you need to create the Security Fabric group in FortiGate.
Fortinet recommends using a dedicated Super_User administrator account on the FortiGate for FortiAnalyzer access.
This ensures that associated log messages are identified as originating from FortiAnalyzer activity. This dedicated
Super_User administrator account only needs Read Only access to System Configuration; all other access can be set to
None.
Once a Security Fabric group is added in FortiAnalyzer, it can be used to filter other panes, such as Log View and
FortiView. You can select the Security Fabric or individual devices in the fabric from the Device filter in those panes.
4. Enter the Authentication Credentials. The authentication credentials are the ones you specified in FortiGate. Once
the FortiGate root has been authenticated, the Warning icon will disappear.
5. After authentication, it takes a few minutes for FortiAnalyzer to automatically populate the devices under the
FortiGate root which creates the Security Fabric group.
For Security Fabric devices, you can display the Security Fabric topology.
FortiAnalyzer correlates traffic logs to corresponding UTM logs so that it can report sessions/bandwidth together with its
UTM threats. Within a single FortiGate, the correlation is performed by grouping logs with the same session IDs, source
and destination IP addresses, and source and destination ports.
In a Cooperative Security Fabric (CSF), the traffic log is generated by the ingress FortiGate, while UTM inspection (and
subsequent logs) can occur on any of the FortiGates. This means that the traffic logs did not have UTM related log fields,
as they would on a single FortiGate. Different CSF members also have different session IDs, and NAT can hide or
change the original source and destination IP addresses. Consequently, without a proper UTM reference, the
FortiAnalyzer will fail to report UTM threats associated with the traffic.
This feature adds extensions to traffic and UTM logs so that they can be correlated across different FortiGates within the
same security fabric. It creates a UTM reference across CSF members and generates the missing UTM related log fields
in the traffic logs as if the UTM was inspected on a single FortiGate.
NAT translation is also considered when searching sources and destinations in both traffic and UTM logs. The FortiGate
will generate a special traffic log to indicate the NAT IP addresses to the FortiAnalyzer within the CSF.
Traffic logs to DNS and SSH UTM references are also implement - the DNS and SSH counts in Log View can now be
clicked on to open the related DNS and SSH UTM log. IPS logs in the UTM reference are processed for both their
sources and destinations in the same order, and in the reverse order as the traffic log. The FortiGate log version indicator
is expanded and used to make a correct search for related IPS logs for a traffic log.
This feature requires no special configuration. The FortiAnalyzer will check the traffic and UTM logs for all FortiGates
that are in the same CSF cluster and create the UTM references between them.
Like other UTM logs, newly added DNS and SSH UTM references can also be shown in the FortiAnalyzer Log View.
Clicking the count next to the DNS or SSH event opens the respective UTM log.
3. Go to FortiView > Threats > Top Threats. All threats detected by any CSF member are shown.
4. The created UTM reference is also transparent to the FortiGate when it gets its logs from the FortiAnalyzer. On the
FortiGate, the traffic log shows UTM events and referred UTM logs from other CSF members, even though the
FortiGate does not generate those UTM log fields in its traffic log. In this example, the CSF child FortiGate shows
All Fortinet devices included in a Security Fabric can be placed into a Security Fabric ADOM, allowing for fast data
processing and log correlation. Fabric ADOMs enable combined results to be presented in the Device Manager, Log
View, FortiView, Incidents & Events and Reports panes.
In a Fabric ADOM:
l Device Manager: View and add all Fortinet devices in the Security Fabric to the Fabric ADOM, including FortiGate,
FortiSandbox, FortiMail, FortiDDoS, and FortiClient EMS.
l Log View: View logs from all Security Fabric devices.
l FortiView: FortiDDoS and FortiClient EMS widgets are available.
l Incidents & Events: Predefined event handlers for FortiGate, FortiSandbox, FortiMail, and FortiWeb ADOMs are
available, and triggered events are displayed for all device types.
l Reports: View predefined reports, templates, datasets, and charts for all device types. Charts from all device types
can be inserted into a single report.
You can change an existing non-Fabric ADOM to a Fabric ADOM using the FortiAnalyzer CLI.
1. In the FortiAnalyzer CLI, enter the following commands:
execute migrate fabric <fabric name>
A note is displayed informing you of the number of ADOMs that will be affected, and once begun, a summary is
displayed and the system will reboot.
When FortiGate is configured as a SAML SSO IdP in a Security Fabric, FortiAnalyzer can register itself to FortiGate as
an SAML service provider, allowing for simplified configuration of SAML authentication.
When FortiAnalyzer is configured as a Fabric SP, a default SSO administrator is automatically created for each Security
Fabric. When a user logs in through Fabric SSO, the Fabric IdP provides the user's profile name. If FortiAnalyzer has a
profile with a matching name, the profile is assigned to the user. Otherwise, the profile of the SSO administrator is
assigned to the user by default.
Before configuring FortiAnalyzer as a Fabric SP, Security Fabric Connection and FortiAnalyzer Logging must be
configured on the root FortiGate.
When ADOMs are enabled, SSO users can only access the ADOM that includes the root
FortiGate.
1. Enable SAML SSO on the root FortiGate in the Security Fabric. For more information, see the FortiGate
documentation in the Fortinet Document Library.
2. On FortiAnalyzer, enable the Fabric SP Single Sign-On Mode.
a. Go to System Settings > SAML SSO.
b. Select Fabric SP as the Single Sign-On Mode.
c. Enter the address of the FortiAnalyzer SP.
d. Select a Default Admin Profile.
e. Click Apply.
The FortiAnalyzer will automatically detect the IdP FortiGate and register itself as a SAML SP. This process may
take up to ten minutes. Once completed, IdP information is displayed in the Fabric SP table on FortiAnalyzer, and
SP information can be viewed in FortiOS.
Fabric devices configured to the IdP can be accessed through the Security Fabric members dropdown which
appears in the top-right corner of the toolbar.
Use Incidents & Events to generate, monitor, and manage alerts and events from logs. The live monitoring of security
events is a powerful and enabling feature for security operations. Incidents can be created from events to track and
respond to suspicious or malicious activities.
You can also use Incidents & Events to review Outbreak Alerts, MITRE ATT&CK® coverage, and SIEM log parsers.
Incidents
Raising an incident
You can raise an incident only from alerts generated for one endpoint.
Incidents can be raised in the following ways:
l In Incidents & Events > Incidents > Incidents, click Create New in the toolbar. This opens the Create New Incident
pane.
l In Incidents & Events > Event Monitor > All Events, right-click an event and select Create New Incident. This opens
the Create New Incident pane with the applicable fields filled in, such as the Affected Endpoint.
The following is a description of the options available in the Create New Incident pane.
Option Description
Option Description
MITRE Tech ID Select the MITRE ATT&CK technique ID(s) that the incident may correspond to.
The techniques are organized in the list according to their MITRE domain and
tactic.
The incident will be included in count for the MITRE ATT&CK matrix. For more
information, see MITRE ATT&CK® on page 186.
Affected Endpoint In the Raise Incident pane, the affected endpoint is filled in and cannot be
changed.
In the Create New Incident pane, select the affected endpoint from the dropdown
list.
Managing incidents
You can review created incidents in Incidents & Events > Incidents > Incidents. The incidents are displayed in a table
view.
There are three charts displayed above the table:
l Severity
l Status
l Category
By default, the Show Charts toggle is enabled. You can select which charts appear by selecting them in the Show Charts
dropdown, or you can hide all the charts by disabling the Show Charts toggle.
Mouse over the charts to see more information in a tooltip. Click a section of a chart to filter the charts and the table by
that information. You can apply multiple filters across the charts. Once filtered, a filter icon appears next to the chart title;
click the filter icon to remove the filter. You can also filter the table by the time frame dropdown in the toolbar.
In the table view, you can use the Incident Reporter column to identify if an incident was manually created or if it was
created automatically. If it was created automatically, the incident reporter will be the name of the playbook or event
handler that generated the incident. For more information about automatically creating incidents from event handlers,
see Creating a custom event handler on page 228.
You can perform the following actions from the toolbar:
l Create a new incident
l Edit an incident
l Delete incidents
l Enrich an indicator within the incident
l Export an incident's analysis
l Export the incident table view as a CSV
l Edit the incident settings
To create an incident:
To edit an incident:
To delete an incident:
Analyzing an incident
In Incidents & Events > Incidents > Incidents, select an incident or right-click an incident and select Analysis.
Alternatively, you can double-click an incident to open the Incident Analysis pane. The Incident Analysis pane displays
the incident's affected endpoint and user, audit history, attached events, reports, comments, and more.
Some features of incident analysis are only available with the applicable license.
You can perform the following actions from the toolbar in the Incident Analysis pane:
Action Description
Enrich Enrich an indicator within the incident. For more information, see Indicator
enrichment on page 248.
Widget Description
Widget Description
modified.
l Incident Name: The name of the incident.
l Incident Date/Time: The date and time that the incident was created. This is
displayed, but cannot be modified.
l Incident Update Date/Time: The date and time that the incident was last
updated. This is displayed, but cannot be modified.
l Incident Category: The incident category, including Unauthorized Access,
Denial of Service (DoS), Malicious Code, Improper Usage,
Scans/Probes/Attempted Access, and Uncategorized.
l MITRE Tech ID: The techniques associated with the incident. These can be
added via the dropdown list, which organizes the techniques by domain and
tactic.
l Severity: The severity of the incident, including High, Medium, and Low.
l Status: The current status of the incident, including New, Analysis,
Response, Closed: Remediated, and Closed: False Positive.
l Affected Endpoint: The endpoint associated with this incident. This is
displayed, but cannot be modified.
l Description: A description of the incident provided by the administrator.
l Assigned To: A dropdown menu of administrators to which the incident can
be assigned.
After making modifications, click Update to save your changes.
Affected Endpoint/User Information about the affected endpoint/user. When multiple endpoints/users are
associated with the incident, the total number is displayed and you can click the
forward or backwards arrow on the tile to cycle between them.
Comments Displays comments made by administrators for this incident with a timestamp.
The most recent comments appear at the top of the list.
Enter a comment and click POST to create a new comment.
Existing comments can be edited and deleted by administrators.
Affected Assets Displays affected asset(s) in a table view. Includes the endpoint, user, IP address,
and MAC address of the asset.
Click a user in the User column to display endpoint information in a separate
dialog.
Incident Timeline The timeline of the events raised for the incident.
Scroll using your mouse wheel to change the displayed time frame. Mouse over
the event to display a tooltip of its details.
Events Displays the events that have been raised for this incident in a table view. You can
use the search bar to search for events; toggle Match Case and Use Regular
Expression using the icons in the search bar.
You can perform the following actions after selecting an event:
l View Logs: Open the View Logs pane, display the related logs for the event
in a table view.
Widget Description
l Search in Log View: Open Log View filtered by the event in a new tab.
l Delete: Delete the event.
Audit History Displays the history of changes made to an incident, including the user who made
the change and information about the type of change that was made.
Click Expand All to see additional details.
Reports Attach and manage reports related to this incident. The reports are displayed in a
table view, listing the report name, format, time range, and devices.
See Adding reports to an incident on page 186.
Processes Displays endpoint processes associated with this incident including the process
ID, process path, and network connection.
Select a time period to view by choosing a snapshot from the snapshot dropdown.
Processes can be displayed in a table format or as raw data.
Software Displays endpoint software associated with this incident including the software,
installation path, and installation time.
Select a time period to view by choosing a snapshot from the snapshot dropdown.
Software can be displayed in a table format or as raw data.
Vulnerabilities Displays endpoint vulnerabilities associated with this incident including the
vulnerability name, ID, severity, and category.
Select a time period to view by choosing a snapshot from the snapshot dropdown.
Vulnerabilities can be displayed in a table format or as raw data.
To configure incident settings, go to Incidents & Events > Incidents > Settings.
When an incident is created, updated, or deleted, you can send a notification to external platforms using selected fabric
connectors. To create fabric connectors to external platforms, such as ServiceNow or MS Teams, see ITSM connectors
on page 258.
Reports can be attached to incidents to include historical data relevant to that incident.
Reports can be added to incidents through the following methods:
1. Reports can be manually added by an admin from the Reports module or from the incident's Incident Analysis pane.
2. Reports can be automatically added to an incident by a playbook. See Automation on page 249.
Once a report has been attached to an incident, it can be viewed, managed, and downloaded from the Reports widget on
the incident's Incident Analysis pane. Multiple reports can be attached to a single incident.
MITRE ATT&CK®
MITRE (MIT Research Establishment) ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a
framework for handling cyber threats. This framework consists of tactics and techniques organized into matrices. With
the appropriate license, you can leverage these matrices in the FortiAnalyzer GUI:
l Incidents & Events > Incidents > MITRE ATT&CK®
l Incidents & Events > Incidents > MITRE ATT&CK® ICS
The column headers in the MITRE ATT&CK matrices are tactics, and the tiles within these columns are the relevant
techniques.
FortiAnalyzer associates incident and event information with the relevant tactics and techniques. FortiAnalyzer also
displays coverage in the MITRE ATT&CK matrices, so you can determine which event handlers help to cover specific
tactics and techniques.
The MITRE Domain and MITRE Tech ID fields in event handlers are used to associate the
handlers and their resulting events to the correct tactic and technique. For more information
about configuring event handlers, see Creating a custom event handler on page 228 and
Creating a custom correlation handler on page 233.
This topic explains the two options available in MITRE ATT&CK® and MITRE ATT&CK® ICS:
l Attack
l Coverage
The examples displayed below are for the MITRE ATT&CK® pane, but the same functionality exists for the MITRE
ATT&CK® ICS pane.
The OT Security Service is required for FortiAnalyzer to use all functionality in the MITRE ATT&CK® ICS pane. For more
information about this service, see the FortiAnalyzer Datasheet.
Attack
You can review incident and event information organized within the MITRE ATT&CK matrices from the Attack tab. You
can filter the matrices using the time frame dropdown, and you can refresh the matrices as needed.
If there are events associated with the technique, an icon and count displays on the tile. A separate icon and count
displays for the associated incidents as well. Mouse over the tile to display the information in a tooltip. If there are sub-
techniques, the tooltip breaks down which sub-technique the events and incidents are associated with.
Click a tile with associated events or incidents to open a pane for that technique. In this pane, you can toggle between
table views for Events and Incidents.
Column Description
Event Count The event count related to that event handler and technique or sub-technique.
Click the event count to open the Event Monitor in a new tab. It is filtered by the
selected handler and time range from the matrix. For more information, see Event
Monitor on page 190.
Column Description
If there are no events or incidents associated with a technique but it has at least one event handler, a covered icon
displays on the tile. Mouse over the tile to display the number of event handlers and the list of sub-techniques in a tooltip.
To review the coverage in more detail, go to the Coverage tab. See Coverage.
If there are no events, incidents, or event handlers associated with a technique, the tile will not display any icons and the
mouse-over tooltip will not be available.
Coverage
You can review event handler coverage according to the MITRE ATT&CK matrices from the Coverage tab. You can
refresh the matrices as needed.
When a basic or correlation event handler is associated with a technique, it will be included as part of the coverage for
that technique. The tile displays an icon and count for associated event handlers. Mouse over the tile to display the
information in a tooltip. This includes the total event handler count and a breakdown of the count for each sub-technique,
if they are available.
Click a tile with coverage to open a table view of event handlers for that technique. The table includes the following
information:
Column Description
Event Handlers The name of the event handler. Click the name to view the event handler
configuration. You can edit the Status, MITRE Domain, and MITRE Tech ID from
this pane, if needed.
After updating the coverage for an event handler, refresh the MITRE ATT&CK®
matrix to display the changes.
Technique The technique or sub-technique(s) associated with the event handler. If there are
multiple sub-techniques associated with the event handler, the count will be
provided in this column. Click the count to display which sub-techniques are
associated with the event handler.
If there are no event handlers associated with a technique, Enabled or Disabled, the tile will not display any icons and the
mouse-over tooltip will not be available.
Event Monitor
After event handlers start generating events, view events and event details in Incidents & Events > Event Monitor.
When rebuilding the SQL database, you might not see a complete list of historical events.
However, you can always see events in real-time logs. You can view the status of the SQL
rebuild by checking the Rebuilding DB status in the Notification Center.
All Events
To view all the events, go to Incidents & Events > Event Monitor > All Events.
Double-click an event line to drill down for more details.
Hover your mouse over an entry to view the asset and identity information for that event.
Save as New Custom View Save the current view including filter settings, device selection, and time period.
Devices Select devices from the dropdown to filter the table view.
Time Period Select a time period to filter the table view. Select Custom to specify a time period
not in the dropdown list.
Show Acknowledged Click to include acknowledged events in the table view. See Acknowledging
events on page 194.
Collapse All/Expand All Click to expand or collapse the event details displayed in the table view.
Export to CSV Click to download the current table view of events in a CSV file.
Filters Enter filters for the table view. See Filtering events on page 193.
Column Settings Select which columns are displayed for the table view.
By right-clicking an event in the table view, you can perform the following actions from the shortcut menu:
Comment Enter a comment for the event. The comment is displayed in the Comment
column, which can be added to the table view from Column Settings.
Assign To Select an admin to assign the event to. The assigned admin is displayed in the
Assigned To column, which can be added to the table view from Column Settings.
View Logs Open a table view of sampled logs associated with the event.
For example, if there are 20 associated logs that triggered the event under the
same conditions, only one sample log display in the View Logs pane. To view all
logs associated with the event, use Search in Log View.
Search in Log View Open Log View in a separate tab, filtered to display all logs associated with the
event.
Create New Incident Create a new incident from the event. See Raising an incident on page 180.
Add to Existing Incident Attach the event to an existing incident. In the Attach to Incident dialog, enter an
incident number or select an incident from the table and click OK.
Filter by <criteria> = Filter for events that are equal to the criteria that you right-clicked in the table
view. See Filtering events on page 193.
Filter by <criteria> != Filter for events that are not equal to the criteria that you right-clicked in the table
view. See Filtering events on page 193.
FortiAnalyzer event handlers apply one or more tags to events, allowing the events to be grouped into views in the Event
Monitor. These views are visible in the navigation.
Default views are organized into three view categories under Incidents & Events > Event Monitor:
l By Endpoint: Provides security event views from an endpoint perspective.
l By Threat: Provides security event views from a threat perspective.
l System Events: Provides event views which cover device system events.
In order for events to be displayed in default views, the corresponding event handler(s) must be enabled. Refer to the
chart below for a list of the predefined event handlers that must be enabled to support each default view:
By Endpoint All Security Events Displays all events within category with enabled handlers
By Threat All Security Events Displays all events within category with enabled handlers
Default views can be hidden or disabled. For more information, see Managing default views.
Admins can copy existing views to create custom views. For more information, see Creating custom views.
Filtering events
Filter the Event Monitor using Add Filter in the toolbar or by right-clicking an entry and selecting a context-sensitive filter.
You can also filter by specific devices or timeframes.
1. Type the filter and its condition. Use the log field names and values.
2. To add more filters, type the connector (AND or OR) and then type the next filter.
Right-click a filter criteria in the table view and select one of the following:
l Filter by <criteria> =: Filter for events that are equal to the criteria you selected.
l Filter by <criteria> !=: Filter for events that are not equal to the criteria you selected.
These options are only available for certain columns.
In the event list, right-click an entry and select Search in Log View.
Log View will launch with the filter automatically filled in with the following information:
l Log type of the event
l Time range (the first to the last occurrence of the event)
l Event trigger and group by value
In an event list, to view event details, double-click an event line to drill down for more details.
The event details page contains information about the event and a list of all individual logs. You can work on events
using buttons in the toolbar or by right-clicking an event.
l To change what columns to display, click Column Settings or Column Settings > More Columns.
l In event details, to view raw logs, click Tools > Display Raw.
l To switch back to formatted log view, click Tools > Formatted Log.
l To return to the previous page, click the back button.
You can view IPS signature information from the event details when they are available by clicking on the link included in
the log's Attack Name column. You can add the Attack Name column to the table using Column Settings.
After clicking the attack name link, a dialog window appears which includes the IPS signature information. You can click
Show Raw Data to display the raw information and access additional features including a search option.
Acknowledging events
Acknowledging an event removes it from the event list. Click Show Acknowledged to view acknowledged events.
You can enable the Acknowledged By and Acknowledged Time columns from the column settings option in the toolbar.
Acknowledged By displays the username of the administrator who acknowledged the event, and Acknowledged Time
displays the time and date that the event was acknowledged.
To acknowledge events:
Assigning events
To assign an event:
3. Select a user from the dropdown or select Assign to Myself, and click OK.
When enabled, the Assigned To column displays the username of the administrator assigned to the event.
Default views in the By Endpoint, By Threat, and System Events view categories can be disabled or copied as a custom
view, allowing you to display only the views that are useful to the user.
l By Threat
l System Events
l Custom View
l Disabled: Only you can see this custom view displayed in Incidents & Events > Event Monitor > Custom View.
When upgrading from versions prior to 6.2.0, existing custom views will be placed in the
Custom View category.
In the Event Monitor dashboards, you can view the status of an event in the Event Status column. Event statuses include
Unhandled, Mitigated, Contained, and (blank).
Event statuses are applied by the associated event handler. When creating a custom event handler, you can manually
select an event status or choose to allow FortiAnalyzer to decide.
In general, when Allow FortiAnalyzer to choose is selected, the event status for UTM events is applied based on the
following:
Unhandled The security event risk is not mitigated or contained, so it is considered open.
Example: an IPS/AV log with action=pass will have the event status Unhandled.
Botnet and IoC events are also considered Unhandled.
Event handlers
Basic event handlers and correlation event handlers determine what events are generated from logs.
For basic event handlers, an event is generated when one of the rules in the event handler is met. Each rule in the basic
event handler has an OR relationship with the others.
For correlation event handlers, an event is generated when a set of rules are met in correlation sequence. For correlation
handlers, you can define both the rules and the operators (AND, AND_NOT, OR, FOLLOWED_BY, and NOT_
FOLLOWED_BY).
There are predefined event handlers for FortiGate, FortiSandbox, FortiMail, and FortiWeb devices. In a Security Fabric
ADOM, all predefined event handlers are displayed. Some predefined event handlers are disabled by default, but you
can enable them from the GUI.
You can also create your own custom event handlers. An easy way to create a custom event handler is to clone a
predefined event handler and customize its settings.
Data selectors and notification profiles are configured separately from event handlers, and then selected as part of
configuring predefined or custom event handlers as needed. Data selectors determine which devices, subnets, and
filters to use for the handler, and notification profiles determine if and where to send alert notifications when an event is
generated by the handler. These groupings promote reusability, which results in increased efficiency and a reduction in
human error when configuring event handlers.
When ADOMs are enabled, each ADOM has its own event handlers and list of events. Ensure you are in the correct
ADOM when working in Incidents & Events. You can import and export the event handlers, allowing you to develop
custom event handlers and deploy them in bulk to other ADOMs or FortiAnalyzer units, if needed.
Event handlers generate events only from Analytics logs and not Archive logs. For more
information, see Analytics and Archive logs.
In an Analyzer–Collector collaboration scenario, the Analyzer evaluates the event handlers.
For more information, see Analyzer–Collector collaboration.
In Incidents & Events > Handlers, you can manage the Data Selectors, Notification Profiles, Basic Handlers, and
Correlation Handlers separately.
In this section, you will find the following topics:
l Predefined event handlers on page 198
l Predefined correlation handlers on page 224
l Creating data selectors on page 244
l Creating notification profiles on page 245
l Creating a custom event handler on page 228
l Creating a custom correlation handler on page 233
l Using the Automation Stitch for event handlers on page 238
l Using the Generic Text Filter on page 239
l Managing event handlers on page 240
l Enabling event handlers on page 241
l Cloning event handlers on page 241
l Resetting predefined event handlers to factory defaults on page 242
l Importing and exporting event handlers on page 242
FortiAnalyzer includes many predefined event handlers that you can use to generate events. You can easily create a
custom event handler by cloning a predefined event handler and customizing its settings. See Cloning event handlers on
page 241.
If you wish to recieve notifications from a pedefined event handler, configure a notification profile and assign it to the
event handler. See Creating notification profiles on page 245.
In 6.2.0 and up, predefined event handlers have been consolidated and have multiple rules
that can be enabled or disabled individually.
To view predefined event handlers in the FortiAnalyzer GUI, go to Incidents & Events > Event Handlers > Basic
Handlers. From the More dropdown, select Show Predefined.
Default-NOC-Interface-Events Event handler for FortiGate device type logs to generate events for vlan/interface
status up or down, and DNS service on interface status.
Disabled by default
Rule 1: Interface status changed to up
l Event Severity: Medium
Default-NOC-FortiExtender- Event handler for FortiGate device type logs to generate events for FortiExtender
Events alerts, authorization and controller activity events.
Disabled by default
Rule 1: FortiExtender Authorized
l Event Severity: Medium
Default-NOC-Routing-Events Event handler for FortiGate device type logs to generate events for changes in
routing information including BGP Neighbor Status, Routing information change,
OSFP Neighbor Status, Neighbor Table Changed and VRRP State Changed
Disabled by default
Rule 1: Routing information changed
l Event Severity: Medium
Default-NOC-Network-Events Event handler for FortiGate device type logs to generate network events including
SNMP queries, routing information changes, DHCP server and status changes
Disabled by default
Rule 1: Device SNMP query failed
l Event Severity: High
Default-NOC-Switch-Events Event handler for FortiGate device type logs to generate events for Switch-
Controller added/deleted or authorized/deauthorized, Switch-Controller Status,
Interface flapping, LAG/MCLAG and split-brain status, Cable test/diagnosis and
physical port up/down
Disabled by default
Rule 1: Switch-Controller activity detected
l Event Severity: Medium
Default-NOC-HA-Events Event handler for FortiGate device type logs to generate events for HA cluster
updates and alerts including HA Device interface failure, Cluster Priority
Changed, cluster member state moved, device interface down, HA device
syncronization status, connection to FortiAnalyzer status, FortiManager tunnel
connection status and connection with CSF member status.
Disabled by default
Rule 1: HA device interface failed
l Event Severity: High
Default-NOC-Wireless-Events Event handler for FortiGate device type logs to generate events for wireless wifi,
AP updates and alerts including AP Status Change and Fake/Rogue AP
detection, wireless client status change added/removed/allowed or denied status,
signal to noise ratio (SNR) poor/fair/good, SSID status up/down.
Disabled by default
Rule 1: Fake AP detected
l Event Severity: Medium
Default-NOC-Security-Events Event handler for FortiGate device type logs to generate events for security
events including Admin Logins failed or disabled, Admin or Admin Monitor
Disconnected, Admin password expired and UTM Profile changes
Disabled by default
Rule 1: Admin login failed or desabled
l Event Severity: High
Default-NOC-Fabric-Events Event handler for FortiAnalyzer and FortiGate log device type to detect Fabric
events, including device offline, CSF member connection status down or
terminated, CSF member configuration changes, automation stitch triggered ,
licenses that are expiring or failed updates.
Disabled by default
Rule 1: Device offline detected
l Event Severity: High
Default-NOC-System-Events Event handler for FortiGate device type logs to generate events for system events
including Power failure and device shutdown, High Resource usage (CPU, Mem,
Storage), log device full status warnings and disk rolled, and devices
entering/exiting conserve mode.
Disabled by default
Rule 1: Device shutdown detected
l Event Severity: Critical
Default-NOC-VPN-Events Event handler for FortiGate device type logs to generate events for VPN status
changes including IPsec Phase1 error or failure, and Phase2 Up/Down and
errors, Ipsec Tunnel Up/Down, VPN SSL login failures, IPSec ESP Error, IPsec
DPD failures
Disabled by default
Rule 1: User SSL VPN login failed
l Event Severity: High
Default-NOC-SD-WAN-Events Event handler for FortiGate device type logs to generate events for SD-WAN
status, alerts, and health check events including SLA targets/SLA met or not met
for jitter, latency, packetloss, Health-check server status (alive or dead), status
(up or down), and member status change.
Disabled by default
Rule 1: SLA failed for jitter
l Event Severity: High
Default-NOC-Docker-Events Event handler for FortiGate device type logs to generate events for Docker
including inlcuding container enabled/disabled, CPU value set/max reached and
MEM value set/max reached
Disabled by default
Rule 1: Memory report detected
l Event Severity: Medium
Below are examples of raw logs that would trigger the associated default event handler.
FortiOS predefined system event handlers are consolidated into a single event handler with multiple rules called Default
FOS System Events.
Events are organized by device in the Incidents & Events dashboards, which can be expanded to view all related events.
Default FOS System Events rules apply tags to each event, allowing you to identify which Default FOS System Events
rule triggered the event.
If you are upgrading from a version before FortiAnalyzer 6.2.0, the existing legacy predefined
handlers which are enabled or have been modified will be available as custom handlers. In the
Event Handler List, select the More dropdown and choose Show Custom.
FortiAnalyzer includes some predefined correlation event handlers that you can use to generate events.
If you wish to recieve notifications from a pedefined correlation handler, configure a notification profile and assign it to the
correlation handler. See Creating notification profiles on page 245.
To view predefined event handlers in the FortiAnalyzer GUI, go to Incidents & Events > Handlers > Correlation Handlers.
From the More dropdown, select Show Predefined. Predefined correlation handlers are named according to their use
case. For example, there are predefined correlaton handlers for:
l CnC (Command and Control)
l Credential Access
l Defense Evasion
l Execution
l Exfiltration
l Initial Access
l Lateral Movement
l Persistence
l Privilege
CnC - Default-Suspicious- This handler is to detect if an endpoint is infected and there is a large traffic from
Traffic-From-Infected- the same endpoint.
Endpoint Disabled by default
Event Severity: Medium
Tags: CnC
Threshold Duration: 30 minutes
Correlation Sequence:
Logic Group 1
OR
OR
OR
Correlation Criteria:
l Traffic to Botnet CnC detected or blocked in virus log endpoint = Traffic to
Credential Access - Default- This handler is to detect if an account login failed many times not followed by a
Brute-Force-Account-Login- login success for FortiAnalyzer.
Attack-FAZ Disabled by default
Event Severity: Medium
Tags: login, attack
Threshold Duration: 30 minutes
Correlation Sequence:
NOT_FOLLOWED_BY, within 5m
Login Success
Correlation Criteria:
l Login Failed 5 Times devid = Login Success devid
Credential Access - Default- This handler is to detect if an account login failed many times not followed by a
Brute-Force-Account-Login- login success for FortiGate.
Attack-FGT Disabled by default
Event Severity: Medium
Tags: login, attack
Threshold Duration: 30 minutes
Correlation Sequence:
NOT_FOLLOWED_BY, within 5m
Login-Success
Correlation Criteria:
l Login Failed 5 Times devid = Login-Success devid
You can create a custom event handler from scratch or clone a predefined event handler and customize its settings. See
Cloning event handlers on page 241.
Configuring an event handler includes defining the following main sections in the GUI:
Option Description
Event handler attributes The status, name, description, MITRE techniques, data selector, and automation
stitch for the event handler.
Option Description
each group by applying filters with other log fields. Logs that match the filters
will be retained within each group.
3. Define Event Conditions: Once you've organized and filtered the logs, set up
criteria that enables the system to automatically initiate events when log
records reoccur within each group.
Option Description
Enabled event handlers show a icon in the Status column. Disabled event
handlers show a icon in the Status column.
MITRE Domain If applicable, select the MITRE ATT&CK domain that the event handler will
help to cover. For more information, see MITRE ATT&CK® on page 186.
MITRE Tech ID Select the MITRE ATT&CK technique ID(s) that the event handler provides
coverage for.
Option Description
Automatically Create Incident Enable or disable if incidents are automatically created through this event
handler.
When enabled, once the handler triggers an alert, a new incident is created
with the name as <Handler Name>: <Event Subject>. If there are new
events with same subject, they will be directly attached to the same incident. A
new incident is created if the event has a new subject, or if the existing
incident's status has changed to Closed.
The incidents created from event handlers can be identified in Incident &
Events > Incidents > Incidents. The automatically created incidents display
<alertid>/Auto-Raised in the Incident Reporter column .
Rules
Add New Rule Click to add a rule. The Add New Rule pane displays. Configure the options
below, and then click OK to save the rule.
You can add multiple rules to the event handler. Each rule has an OR
relationship with other rules enabled in the event handler.
Status Enable or disable the rule. If the rule is disabled, it will not be used to generate
events.
Event Severity Select the severity from the dropdown list: Critical, High, Medium, or Low.
Log Device Type If you are in a Security Fabric ADOM, select the log device type from the
dropdown list. If you are not in a Security Fabric ADOM, you cannot change
the Log Device Type.
The Fabric log device type can be used to generate alerts from SIEM logs
when SIEM logs are available.
Log Type Select the log type from the dropdown list.
When Devices is set to Local Device, you cannot change the Log Type or Log
Subtype.
Log Subtype Select the category of event that this event handler monitors. The available
options depend on the platform type.
This option is only available when the Log Type has a subtype. For example,
Event Log and Traffic Log have log subtypes which can be selected from the
dropdown.
Log Field Select the log fields for the system to categorize logs into smaller groups.
Option Description
For example, consider the scenario where the Log Field is set using Source
IP (srcip). When log entries are recorded with source IPs such as
192.168.1.1, 192.168.1.2, and 192.168.1.3, the system will categorize these
logs into distinct groups:
l Group 1: Logs with the source IP 192.168.1.1
After the log device and log type are selected, the Log Field dropdown list
will only include log fields that belong to the specified log type. For
example, the Botnet IP log field is available when the Log Type is DNS,
but not available when the Log Type is Event Log.
l Match Criteria: Select an operator from the dropdown. The available
options depends on the selected log field.
Some log fields, such as Source Port, will provide a variety of operators in
the dropdown list, such as Equal To, Not Equal To, Greater Than or Equal
To, Less Than or Equal To, Greater Than, and Less Than.
Other log fields, such as Log Description, will be limited to Equal To and
Not Equal To.
l Value: Select a value from the dropdown list or enter a value in the text
box. The available options depends on the selected log field.
If there is no dropdown list provided by FortiAnalyzer, you must manually
enter a value to find in the raw log.
If a dropdown list is provided, you can select a value from the list. For
some log fields, such as Level, the dropdown list also allows you to enter
a custom value. If there is no textbox to enter a custom value in the
dropdown list, you must use the Generic Text Filter instead.
In the Action column, click plus (+) to insert a new filter below. You can insert
multiple filters. To delete a filter, click the x next to the filter.
Log Filter by Text Enter a generic text filter. See Using the Generic Text Filter on page 239.
For information on text format, hover the cursor over the help icon. The
operator ~ means contains and !~ means does not contain.
Trigger an event Select the radio button for one of the following options and configure the
when: criteria:
l A group contains <integer> or more log occurences
l Within a group, the log field <log field> has <integer> or more
unique values
Option Description
l Click the toggle icon to change to "[...] has fewer than <integer>
unique values"
l The sum of <measure> is greater than or equal to <integer>
Advanced Settings
Event Type Specify a custom event type, or leave this field blank to use the default value.
Override
Event Status Select Allow FortiAnalyzer to choose or select a status from the dropdown list:
Unhandled, Mitigated, Contained, (Blank). You can use a custom event status
by clicking the plus (+) that appears in the Event Status dropdown.
Event statuses, including custom statuses, are displayed in the Event Status
column in the Event Monitor.
Indicators (Optional) Add indicators by clicking the plus (+). You can configure the Log
Field, Indicator Type, and Count for each indicator created in an event
handler. Use the buttons in the Action column to add (+) or remove (x)
indicators. Up to five indicators can be created.
When Indicators is selected in Event Monitor > Display Options, the Indicators
column displays indicator types for detected events. You can see additional
details when clicking on an indicator. See Event Monitor on page 190.
If an incident is raised from an event that includes indicators, they can be
viewed in the Indicators tab of the incident analysis page. See Analyzing an
incident on page 183.
Additional Info Specify what to show in the Additional Info column of the Event Monitor.
Option Description
Select Use system default or Use custom message. A custom message can
include variables and log field names. For more information, hover over the
help icon.
Handler Settings
Notifications Select a notification profile for the event handler. See Creating notification
profiles on page 245.
You can create a custom correlation handler from scratch or clone a predefined correlation handler and customize its
settings. See Cloning event handlers on page 241.
Configuring an correlation handler includes defining the following main sections in the GUI:
Option Description
Correlation event handler The name, description, data selector, MITRE techniques, and automation stitch
attributes for the correlation handler.
This section also includes the threshold duration for the handler.
Correlation Sequence The rules for event generation in sequence and logic group.
1. Choose Your Logs: Start by selecting the device and log type that you want
to monitor for events. Choose log fields to categorize logs into smaller
groups.
2. Refine Your Logs: Once logs are grouped, you can refine the data within
each group by applying filters with other log fields. Logs that match the filters
will be retained within each group.
3. Define Event Conditions: Once you've organized and filtered the logs, set up
criteria that enables the system to automatically initiate events when log
records reoccur within each group.
Correlation Criteria The correlation criteria to specify the type of logs that the event handler will look
for. The criteria is applied to two rules on a field from each rule.
Handler Settings The event fields, including the event type override, event message, event status,
event severity, indicators, and tags.
This section also includes the notification profile for the correlation handler.
Option Description
Enabled event handlers show a icon in the Status column. Disabled event
handlers show a icon in the Status column.
MITRE Domain If applicable, select the MITRE ATT&CK domain that the event handler will
help to cover. For more information, see MITRE ATT&CK® on page 186.
Option Description
MITRE Tech ID Select the MITRE ATT&CK technique ID(s) that the event handler provides
coverage for.
Automatically Create Incident Enable or disable if incidents are automatically created through this event
handler.
When enabled, once the handler triggers an alert, a new incident is created
with the name as <Handler Name>: <Event Subject>. If there are new
events with same subject, they will be directly attached to the same incident. A
new incident is created if the event has a new subject, or if the existing
incident's status has changed to Closed.
The incidents created from event handlers can be identified in Incident &
Events > Incidents > Incidents. The automatically created incidents display
<alertid>/Auto-Raised in the Incident Reporter column .
Threshold Duration Enter the threshold duration for the correlation handler in minutes.
The logs must match the criteria in correlation sequence within this time to
generate an event.
Correlation Sequence
Add Rule Click the plus icon (+) to add a rule. The Add New Rule pane displays.
Configure the options below and click OK to save the rule.
After creating the rules, make sure they are in the correct correlation
sequence. You can drag and drop the rules to re-order them, if needed.
Select the correlation between each of the rules:
l AND
l AND_NOT
l OR
l FOLLOWED_BY (if selected, enter a time limit for the correlation to occur
in)
l NOT_FOLLOWED_BY (if selected, enter a time limit for the correlation to
occur in)
The rules must be met in the correlation sequence for the event handler to
generate an event.
Click the trash icon to delete a rule.
Option Description
Log Device Type If you are in a Security Fabric ADOM, select the log device type from the
dropdown list. If you are not in a Security Fabric ADOM, you cannot change
the Log Device Type.
The Fabric log device type can be used to generate alerts from SIEM logs
when SIEM logs are available.
Log Type Select the log type from the dropdown list.
When Devices is set to Local Device, you cannot change the Log Type or Log
Subtype.
Log Subtype Select the category of event that this event handler monitors. The available
options depend on the platform type.
This option is only available when the Log Type has a subtype. For example,
Event Log and Traffic Log have log subtypes which can be selected from the
dropdown.
Log Field Select the log fields for the system to categorize logs into smaller groups.
For example, consider the scenario where the Log Field is set using Source
IP (srcip). When log entries are recorded with source IPs such as
192.168.1.1, 192.168.1.2, and 192.168.1.3, the system will categorize these
logs into distinct groups:
l Group 1: Logs with the source IP 192.168.1.1
After the log device and log type are selected, the Log Field dropdown list
will only include log fields that belong to the specified log type. For
example, the Botnet IP log field is available when the Log Type is DNS,
but not available when the Log Type is Event Log.
l Match Criteria: Select an operator from the dropdown. The available
options depends on the selected log field.
Some log fields, such as Source Port, will provide a variety of operators in
the dropdown list, such as Equal To, Not Equal To, Greater Than or Equal
To, Less Than or Equal To, Greater Than, and Less Than.
Other log fields, such as Log Description, will be limited to Equal To and
Not Equal To.
l Value: Select a value from the dropdown list or enter a value in the text
box. The available options depends on the selected log field.
If there is no dropdown list provided by FortiAnalyzer, you must manually
enter a value to find in the raw log.
If a dropdown list is provided, you can select a value from the list. For
some log fields, such as Level, the dropdown list also allows you to enter
Option Description
Generic Text Filter Enter a generic text filter. See Using the Generic Text Filter on page 239.
For information on text format, hover the cursor over the help icon. The
operator ~ means contains and !~ means does not contain.
Trigger an event Select the radio button for one of the following options and configure the
when: criteria:
l A group contains <integer> or more log occurences
l Within a group, the log field <log field> has <integer> or more
unique values
l Click the toggle icon to change to "[...] has fewer than <integer>
unique values"
l The sum of <measure> is greater than or equal to <integer>
Add Logic Group Click the folder icon to add a logic group.
You must select a correlation between groups (AND, AND_NOT, OR,
FOLLOWED_BY, or NOT_FOLLOWED_BY). All groups must be met in
correlation sequence for the correlation event handler to generate an event.
Click the trash icon to delete a logic group.
Show Raw Config Enable to display the raw config of the correlation sequence.
Edits made to the raw config will appear above in the correlation sequence
fields. If there is an error in the text, the fields will not display and you will not
be able to save the changes.
Correlation Criteria Specify the fields that the event handler will look for to correlate the rules.
Each correlation criteria is applied to two rules, using a field from each rule.
Configure the following options for each correlation criteria:
l Rule: Select two rules to create a correlation criteria for.
l Field: Select a field for each rule in the correlation criteria. The fields
available in the dropdown are determined by the Group By field in the
rule.
l Match Criteria: Select an operator from the dropdown. The available
options depends on the selected fields.
Use the buttons in the Action column to add (+) or remove (x) correlation
criteria.
Handler Settings
Option Description
Event Type Override Specify a custom event type, or leave this field blank to use the default value.
Event Status Select Allow FortiAnalyzer to choose or select a status from the dropdown list:
Unhandled, Mitigated, Contained, (Blank). You can use a custom event status
by clicking the plus (+) that appears in the Event Status dropdown.
Event statuses, including custom statuses, are displayed in the Event Status
column in the Event Monitor.
Event Severity Select the severity from the dropdown list: Critical, High, Medium, or Low.
Indicators (Optional) Add indicators by clicking the plus (+). You can configure the Log
Field, Indicator Type, and Count for each indicator created in an event
handler. Use the buttons in the Action column to add (+) or remove (x)
indicators. Up to five indicators can be created.
When Indicators is selected in Event Monitor > Display Options, the Indicators
column displays indicator types for detected events. You can see additional
details when clicking on an indicator. See Event Monitor on page 190.
If an incident is raised from an event that includes indicators, they can be
viewed in the Indicators tab of the incident analysis page. See Analyzing an
incident on page 183.
Additional Info Specify what to show in the Additional Info column of the Event Monitor.
Select Use system default or Use custom message. A custom message can
include variables and log field names. For more information, hover over the
help icon.
Notifications Select a notification profile for the event handler. See Creating notification
profiles on page 245.
All FortiGates added to FortiAnalyzer use a default event handler on the FortiAnalyzer side to receive high severity
events such as Botnet Communication, IPS Attack Pass Through, and Virus Pass Through AntiVirus. This basic event
To receive the notifications from FortiAnalyzer on the FortiGate device, you must configure
FortiAnalyzer logging on the FortiGate device.
To use the notifications as part of an automation stitch, you must configure a trigger on the
FortiGate device for each event handler that has automation stitch enabled. This includes the
predefined event handlers with automation stitch enabled, such as Default-Botnet-
Communication-Detection.
For more information about configuring FortiAnalyzer logging and automation stitch triggers,
see the FortiGate/FortiOS Administration Guide.
The Generic Text Filter field is available when creating filters for data selectors and rules for event handlers. When
creating an event handler, this field is known as Log Filter by Text.
The generic text filter uses the glibc regex library for values with operators that support regular expression (~,!~, and not
=,!=), using the POSIX standard. Filter string syntax is parsed by FortiAnalyzer, and both upper and lower case
characters are supported (for example, "and" is the same as "AND"). You must use an escape character when needed.
For example, cfgpath=firewall.policy is the wrong syntax because it is missing an escape character. The correct
syntax is cfgpath=firewall\.policy.
Operator Description
= Exact match. Alternatively, you can use ==.
!= Does not match.
< Less than.
<= Less than or equal to.
> Greater than.
>= Greater than or equal to.
~ Matches the regular expression.
!~ Does not match the regular expression.
Tokens:
l (
l )
l &
l |
l and
l or
Example:
To create an event handler using the Log Filter by Text to match raw log data:
To manage basic event handlers, go to Incidents & Events > Event Handlers > Basic Handlers.
To manage correlation event handlers, go to Incidents & Events > Event Handlers > Correlation Handlers.
These panes list the predefined and custom event handlers. An icon in the Status column indicates if the event handler is
enabled or disabled.
The following options are available:
Option Description
Enable / Disable Enable or disable the selected event handler to start or stop generating events.
The current status is indicated by an icon in the Status column.
Generated events are displayed on the Incidents & Events > Event Monitor > All
Events pane.
Import / Export Export the selected event handlers or import a event handler that you have
exported.
You can export event handlers and import them into another ADOM or
FortiAnalyzer.
Factory Reset If you have modified a predefined event handler, return the selected predefined
event handler to its factory default settings.
For both predefined and custom event handlers, you must enable the event handler to generate events. The Event
Handlers and Correlation Handlers display an icon to indicate which event handlers are enabled. The icon indicates
enabled event handlers and the icon indicates disabled event handlers.
Cloning an event handler allows you to build a custom event handler by using an existing one as a template.
Most attributes in a predefined event handler cannot be modified, such as the name, description, and rule settings. You
can, however, clone a predefined event handler to customize its settings and give it a meaningful name to show its
function.
You can change some settings in predefined event handlers as needed. If required, you can restore those predefined
event handlers to their factory default settings.
The Factory Reset option is only available for predefined event handlers that have been changed.
You can import and export event handlers. This feature allows you to develop custom event handlers and deploy them in
bulk to other ADOMs or FortiAnalyzer units. To do so, export the custom event handlers, and then import them into the
ADOMs or FortiAnalyzer units where you want them deployed. You can also export event handlers as part of your
backup procedure, if needed.
To import handlers:
3. Drag and drop the exported event handler JSON or CONF file into the import dialog, or click Browse to locate the file
on the management computer.
You can import multiple event handlers at a time.
If the imported event handler's name already exists, you will be asked if you want to Rename,
Replace, or Skip.
If you select Rename, the Unix epoch timestamp will be automatically appended to the
imported event handler's name. For example, App Ctrl Event‘1544644459276775. The name
can be edited as required after importing.
If the imported file is the wrong format or has an error, the system will report an error.
Data selectors are used to select devices, subnets, and filters for event handlers. You can create, edit, clone, and delete
data selectors in Incidents & Events > Event Handlers > Data Selectors.
To assign a data selector to a basic event handler, see Creating a custom event handler on page 228.
To assign a data selector to a correlation handler, see Creating a custom correlation handler on page 233.
The filters in the data selector are applied before every rule configured in the event handler.
This means the filter criteria does not need to be added individually within each rule of the
event handler(s) that the data selector is assigned to.
The default data selectors are used in some of the predefined handlers, and they cannot be edited or deleted.
Option Description
event logs. This option is only available in the root ADOM and is
used to query FortiAnalyzer event logs.
For Local Device, the Log Type must be Event Log and Log
Subtype must be Any.
Subnets Select All Subnets to include all subnets, or select Specify to choose
Option Description
Filters Click plus (+) to insert a new filter in the list. The Filter dialog displays.
Configure the options and click OK to save.
To delete a filter from the list, click the x next to the filter.
Log Device Type Select the device type from the dropdown.
Log Type Select a log type from the dropdown. The log types will vary depending
on the device type.
Log Subtype Select a log subtype from the dropdown. The log subtype is not available
for all device types.
Generic Text Filter (Optional) Enter a filter string. For more information, see Using the
Generic Text Filter on page 239.
Notification profiles are used to send alert notifications when an event is generated by an event handler. You can
configure the notification profile to send the alert to an email address, SNMP community, and/or syslog server. You can
also configure the notification profile to send the alert through a fabric connector.
You can create, edit, clone, and delete notification profiles in Incidents & Events > Handlers > Notification Profiles.
To assign a notification profile to a basic event handler, see Creating a custom event handler on page 228.
To assign a notification profile to a correlation handler, see Creating a custom correlation handler on page 233.
3. Configure the following options, and click OK to save the notification profile.
Option Description
Send Alert through Fabric Send an alert through one or more fabric connectors selected from the
Connectors dropdown. Click the plus (+) to add fabric connectors. For more information,
see Configuring connectors for automation on page 251.
Send Alert Email Send an alert to one or more email addresses. Specify the email parameters,
including the mail server. For more information, see Mail Server on page 397.
To Enter the email address(es) to send the alert to. Use a semicolon (;) to
separate multiple email addresses.
Email Server Select the mail server for the alert email.
Send SNMP(...) Trap Send an alert to an SNMP community or user selected from the dropdown. For
more information, see SNMP on page 350.
Send Alert to Syslog Server Send an alert to the syslog server selected from the dropdown. For more
information, see Syslog Server on page 398.
Send Each Alert Separately Enable to send each alert individually instead of in a group.
Indicators
A Incidents & Events > Indicators pane consolidates all detected indicators for centralized analysis. This streamlines
threat evaluation and enables SOC analysts to take swift action to mitigate risks.
Managing indicators
Indicators can be found in Incidents & Events > Indicators. This pane contains a chart view and table view of the
indicators.
There are three charts in the chart view:
l Indicator Type
l Reputation
l Enrichment Status
By default, all three charts are displayed. From the Show Charts dropdown, you can toggle which charts display. You
can also toggle Show Charts to hide all charts, when needed.
Select a value in any of the charts to apply the filter to all charts and the table view. To remove the filter, click the chart
title.
The following actions are available in the toolbar:
Action Description
Create New Create a new indicator. Once the indicator is created, the Source column will
display the admin that created it.
Enrich Enrich the indicator. For more information, see Indicator enrichment on page 248.
Column Description
l URL
l Domain
l Suspicious
l Harmless
l Undetected
l No enrichment
l No data
l auto-created
To edit an indicator:
To delete an indicator:
To enrich an indicator:
Indicator enrichment
The indicator enrichment feature empowers security analysts by providing them with comprehensive threat intelligence
on identified IP addresses, domains, and URLs. This enriched context allows for a deeper understanding of security
incidents, leading to more informed and effective response decisions.
FortiAnalyzer uses FortiGuard and VirusTotal enrichment services to evaluate the risk possessed by the indicators.
These services are used by means of a predefined playbook in FortiAnalyzer: Indicator Enrichment. This playbook is
enabled by default and is read-only. It can be found in Incidents & Events > Automation > Playbook.
The FortiGuard enrichment services are built-in and ready to use, but VirusTotal requires an API Key in the fabric
connector.
You can also enrich the indicator from the toolbar in the table view.
The Enrich option is only available when there are indicators that can be enriched. Private
IP addresses are not valid IP indicators.
3. Click Enrich.
The Enrich pane displays.
4. Review the details in the Enrich pane.
5. Click Save Enrichment or Cancel according to the review.
The indicator will only be processed and enriched after clicking Save Enrichment.
When indicators are enriched, FortiAnalyzer will display the following information:
Section Description
FortiGuard CTS Displays the indicator confidence, IOC tags, IOC, antivirus, and web filter
categories.
VirusTotal Summary Displays a Risk Summary, a Detection tab, and a Details tab.
Risk Summary Displays detailed security vendor analysis, presenting a comprehensive list
indicating whether each vendor has detected the indicator, along with their
assigned risk category if detected.
Details Displays the Whois Summary and Whois Lookup, providing essential information
such as organization details, address, data source, and contact information.
Saving the same enrichment would update the existing entry in the history. A new entry will
only be created when there are changes in the enrichment.
Automation
You can configure playbooks to automate tasks from Incidents & Events > Automation.
A Security Automation subscription is required to run at full capacity. For additional information
about licensing, please see support.fortinet.com.
Summary
Incidents & Events > Automation > Summary provides a dashboard to review playbook performance at a glance.
This dashboard includes the following widgets:
Playbook Summary The total number of playbooks executed and plabook actions (tasks) executed.
Playbooks The total number of playbooks executed by playbook name in a donut chart.
Executed
Total Executed The total number of playbooks executed and actions (tasks) executed in a line chart timeline.
Playbooks and
Actions Trend
Active connectors
Incidents & Events > Automation > Active Connectors displays connectors and the automated actions that they can
perform in playbooks.
The following connectors are available:
l FortiOS
l Local (FortiAnalyzer)
l FortiGuard
l FortiClient EMS / FortiClient EMS Cloud
l FortiMail
l FortiCASB
l FortiAuthenticator
l FortiWeb
l FortiSandbox
l ServiceNow
l Slack
l MS Teams
l Generic webhook
l VirusTotal
Connectors can be used for automation in playbooks, and they can also be used in incident settings and notification
profiles.
Some connectors are available by default, such as the Local, FortiGuard, and VirusTotal connectors. These connectors
are used in default playbooks. Other connectors are not visible in the dashboard unless they are created, such as the
ServiceNow, Slack, and MS Teams connectors.
The status of each connector is indicated by a colored icon:
l Green: The API connection is successful.
l Orange: The API connection is unknown.
l Red: The API connection is down.
FortiOS devices are organized by standalone, Cooperative Security Fabric (CSF), and high availability (HA). Click the
device information on the FortiOS Connector card to view a tree breakdown of the devices.
Local Connector
The local connector is the default connector for FortiAnalyzer and is available automatically. The local connector
displays a set of predefined FortiAnalyzer actions to be used within playbooks.
Local connectors include the following actions:
Name Description
FortiOS Connector
The FortiOS connector is added after the first FortiGate has been authorized on an ADOM. Additional devices
authorized to the ADOM are displayed as separate entries within the same connector. FortiOS connectors are available
in FortiGate and Fabric ADOMs.
The actions available with FortiOS connectors are determined by automation rules configured on each FortiGate.
Automation rules using the Incoming Webhook trigger must be created in FortiOS before they are shown as actions in
FortiAnalyzer. FortiOS automation rules are configured on FortiOS in Security Fabric > Automation. For information on
creating FortiOS automation rules, see the FortiOS administration guide.
Rules for FortiOS actions:
FortiGuard Connector
The FortiGuard connector is automatically configured when a valid license has been applied to FortiAnalyzer.
FortiGuard connectors include the following actions:
Name Description
EMS Connector
FortiClient EMS connectors are configured as Security Fabric connectors. See Security Fabric connectors on page 256.
Individual FortiClient EMS connector actions can be toggled on and off while editing the connector.
FortiClient EMS connectors include the following actions:
Name Description
Get Endpoints Retrieve list of endpoints and all of the related information to enrich FortiAnalyzer
asset and identity views.
Get Software Inventory Retrieve list of software and apps installed on an endpoint to enrich FortiAnalyzer
asset view.
FortiMail Connector
FortiMail connectors are configured as Security Fabric connectors. See Security Fabric connectors on page 256.
FortiMail connectors include the following actions:
Name Description
Get Sender Block List Get the list of blocked senders' email addresses from a session profile.
Get Sender Safe List Get the list of safelisted senders' email addresses from a session profile.
Get Recipient Block List Get the list of blocked recipients' email adddresses from a session profile.
Get Recipient Safe List Get the list of safelisted recipients' email adddresses from a session profile.
Block Sender Email with Block sender's email address with a session profile.
Session Profile
Unblock Sender Email with Unblock sender's email address with a session profile.
Session Profile
Block Recipient Email with Block recipient's email address within a session profile.
Session Profile
Unblock Recipient Email with Unblock recipient's email address within a session profile.
Session Profile
FortiCASB Connector
FortiCASB connectors are configured as Security Fabric connectors. See Security Fabric connectors on page 256.
Creating a FortiCASB connector will automatically create the Get Cloud Service Data (FortiCasb Connector) playbook,
which must be enabled to use the predefined Default-Shadow-IT-Events event handler. For more information, see
Predefined event handlers on page 198.
FortiCASB connectors include the following actions:
Name Description
Get Cloud Data from FCASB Retrieve cloud application, user, and file information.
VirusTotal Connector
The VirusTotal connector is used as part of the indicator enrichment feature through the Indicator Enrichment playbook.
For more information, see Indicator enrichment on page 248.
The VirusTotal connector includes the following actions:
Name Description
FortiAuthenticator Connector
Name Description
Get Schema Retrieves a report for all the endpoint actions within FortiAuthenticator.
Get User Retrieves details of a specific user from FortiAuthenticator based on the user ID,
username, or email you have specified.
Update User Status Updates the user status of a specific user in FortiAuthenticator based on the user
ID and status you have specified.
Get User Lockout Policy Retrieves User Lockout Policy details from FortiAuthenticator.
FortiWeb Connector
Name Description
Get Anomaly Policy Retrieves the domain information of a specific Anomaly Detection policy from
FortiWeb based on the policy name you have specified.
Get Blocked IPs Retrieves all the blocked IPs from the FortiWeb server.
Unblock IPs Release all IPs from the blocked IP list under a specific policy in FortiWeb or
release one IP from the blocked IP list under a specific policy in FortiWeb based
on the policy name and other input parameters you have specified.
Get Blocked Users Retrieves all blocked users or specific blocked users from FortiWeb based on the
input parameters you have specified.
Unblock Users Releases users from the blocked user list in a server policy in FortiWeb based on
the input parameters you have specified.
Get Active Users Retrieves a list of active users by user tracking or site publish type from FortiWeb
based on the input parameters you have specified.
Delete Active Users Deletes active users from a specific policy from FortiWeb based on the policy ID
and other input parameters you have specified.
Get Client Info Retrieves client information in Client Management in FortiWeb based on the input
parameters you have specified.
Name Description
Delete Client Information Deletes information for a specific client from Client Management in FortiWeb
based on the client ID you have specified.
Restore Client Threat Score Restores the threat score of a specific client to 0 in FortiWeb based on the client
ID you have specified.
Get All Virtual Servers Retrieves all virtual servers, virtual IP, and interfaces in each virtual server sub-
table in the JSON format from FortiWeb.
Get All Physical Servers Retrieves the IP addresses in the server pool of all physical servers in the JSON
format from FortiWeb.
Get Server Policy Status Retrieves the details including the status of a server policy from FortiWeb.
Get Server Policy Traffic Retrieves traffic information for traffic on all the system server policies from
FortiWeb, or traffic information for a specific system server policy based on the
policy name you have specified from FortiWeb.
FortiSandbox Connector
Name Description
Get System Status Retrieves the status of the system from FortiSandbox.
Get Scan Status Retrieves the scan stats for the last 7 days from FortiSandbox.
Get Submission Job List Retrieves all job IDs associated with the submission ID you have specified from
FortiSandbox.
Get Job Verdict Retrieves job verdict detail for job ID you have specified from FortiSandbox.
Get File Rating Retrieves file rating for the file type and filehash you have specified from
FortiSandbox.
Get URL Rating Get rating details for the URL you have specified from FortiSandbox.
Get Job Behavior Retrieves job behavior details associated with the file type and filehash you have
specified from FortiSandbox.
Toggle FPN State Marks specified sample based on the Job ID you have specified as false negative
or false positive in FortiSandbox.
Get AV Rescan Result Retrieves AV-Rescan results for the time duration you have specified from
FortiSandbox.
Get File Verdict Retrieves the file verdict details for the file type and filehash you have specified
from FortiSandbox.
Get All Installed VM Retrieves the names and the clone numbers of all installed VMs on FortiSandbox.
List Filehash or URL From Retrieves a list of file hashes or URLs based on the type you have specified from
Malware Package or URL the Malware Package or URL Package in FortiSandbox.
Package
For more information about the uses of ITSM connectors, see ITSM connectors on page 258.
You can use the Active Connectors tab to create and edit the following types of security fabric connectors:
l FortiClient EMS
l FortiMail
l FortiCASB
l FortiAuthenticator
l FortiWeb
l FortiSandBox
Once configured, Security Fabric connectors enrich incident response related actions available in playbooks.
1. Go to Incidents & Events > Automation > Active Connectors, and click Create New.
The Create New Fabric Connector pane displays.
2. Under Security Fabric, select one of the available connector types.
3. In the Configuration tab, configure the following options for:
FortiClient EMS
Property Description
FortiClient IP/FQDN Type the IP address or FQDN for the Security Fabric device.
EMS
Username Type the username for the Security Fabric device.
FortiClient Account ID Super users can type the account ID of the FortiClient EMS Cloud
EMS Cloud instance.
For non-super users, the field is automatically populated with the default
account ID. The FortiAnalyzer device must be registered with FortiCloud
to create and update the connector as a non-super user.
The FortiClient EMS must be v7.0 or later. After the FortiClient EMS
Cloud connector is created, the connector's health-check sends an
authentication request with SNI (the account ID) to the EMS instance.
The authentication request from the FortiAnalyzer device must be
approved in EMS: Administration > Fabric Devices. For more
information, see FortiClient on the Fortinet Document Library.
FortiMail
Property Description
Property Description
IP/FQDN Type the IP address or FQDN for the Security Fabric device.
FortiCASB
Property Description
IP/FQDN Type the IP address or FQDN for the Security Fabric device.
Use the FortiCASB FQDN for your chosen server location. The server location
is selected when creating your FortiCASB account. Use forticasb.com for
global servers or eu.forticasb.com for EU based servers.
FortiAuthenticator
Property Description
IP/FQDN Type the IP address or FQDN for the Security Fabric device.
User Name Type the username for the Security Fabric device.
API Key Enter the API key for the FortiAuthenticator device.
FortiWeb
Property Description
IP/FQDN Type the IP address or FQDN for the Security Fabric device.
User Name Type the username for the Security Fabric device.
FortiWeb ADOM Enter the FortiWeb ADOM that the device is in.
FortiSandBox
Property Description
IP/FQDN Type the IP address or FQDN for the Security Fabric device.
User Name Type the username for the Security Fabric device.
FortiSandBox Instance Type Select the FortiSandBox instance type: On Premise or Cloud.
4. Click the Actions tab to view the actions available with the Security Fabric connector, then click OK.
After the connector is saved, it is visible in Incidents & Events > Automation > Active Connectors with a toggle to
enable or disable the connector.
5. Toggle the status of the connector to disabled or enabled according to your needs.
After the Security Fabric connector is created, playbooks configured in Fabric View can use the connector to execute
automated actions. For a list of connector actions available in playbooks, see Configuring connectors for automation on
page 251.
Default playbooks are automatically created when configuring some Security Fabric connectors. For more information
on playbooks, see Playbooks on page 262.
ITSM connectors
You can use the Active Connectors tab to create the following types of ITSM connectors:
l MS Teams
l ServiceNow
l Slack
l Webhook, a generic connector
You can create ITSM connectors for ServiceNow, Slack, MS Teams, and Webhook.
1. Go to Incidents & Events > Automation > Active Connectors, and click Create New.
2. Under ITSM, select one of the available connector types.
Property Description
Port Specify the port FortiAnalyzer uses to communicate with the external platform.
URL Type the URL of the external platform. This option is not available for the MS
Teams Connector.
Using ServiceNow as an example, copy and paste the URL from ServiceNow
API URL in the Connection to ServiceNow API section in ServiceNow >
FortiAnalyzer System Properties.
Teams Webhook URL Type the incoming webhook URL created in MS Teams. This option is only
available for the MS Teams Connector.
HTTP Authentication Enable or disable HTTP authentication. This option is not available for the MS
Teams Connector.
If enabled, select Basic or OAuth2 authentication type.
Using ServiceNow with Basic authenictation as an example, enter the
username and password from the Connection to ServiceNow API section in
ServiceNow > FortiAnalyzer System Properties.
Using Webhook Connector with OAuth2 authentication as an example, enter
the URL of the token service as well as the client ID and client secret for
authentication.
HTTP Body Type the HTTP body of the message that should be sent in MS Teams by the
connector. This option is only available for the MS Teams Connector.
For example, { \"text\": \"<message to send>\" }. For example, {
\"text\": \"<message to send>\" }. You also use ${} for macros in
the message. For a list of supported macros, see Supported macros for the
MS Teams Connector.
Generic webhook connectors can be used to send notifications about incidents and events. After it is created, the
connector can be added in the incident settings or in notification profiles for event handlers.
l Configuring incident settings on page 185
l Creating notification profiles on page 245
ServiceNow connectors can be used to post incident change notices. After it is created, the ServiceNow connector can
be added in the incident settings or as part of a playbook.
l Configuring incident settings on page 185
l Playbooks on page 262
Slack connectors can be used to send messages in Slack about incidents and events. After it is created, the Slack
connector can be added in the incident settings or notification profiles for event handlers.
l Configuring incident settings on page 185
l Creating notification profiles on page 245
MS Teams connectors can be used to send messages in MS Teams about incidents and events. After it is created, the
MS Teams connector can be added in the incident settings, notification profiles for event handlers, or as part of a
playbook.
l Configuring incident settings on page 185
l Creating notification profiles on page 245
l Playbooks on page 262
Event alerttime ${event.alerttime} Alert time (same with eventtime, but name
consistent with previous notification format)
Playbooks
Playbooks include a starter event (a trigger) and one or more tasks configured with automated actions. A task is run as
soon as the playbook is triggered and all connected tasks preceding it are complete.
To manage playbooks, go to Incidents & Events > Automation > Playbook. The following options are available:
Create New Create a new playbook. Playbooks can be created from scratch or by using
playbook templates.
Run Run selected playbooks that are configured with the ON_DEMAND trigger.
Column Settings Choose which columns are displayed in the playbook table.
Search Perform a text search for the playbook name, description, created time, and
modified time.
Creating a playbook
To create a playbook:
1. Go to Incidents & Events > Automation > Playbook, and click Create New.
Select a playbook template or choose New Playbook created from scratch.
The playbook editor opens.
2. Click within the playbook's title field to change its name and description.
3. Select a playbook trigger from the Triggers menu and configure the trigger's filter conditions.
Once the trigger is created, it is displayed in the playbook editor with highlighted connector points.
For more information on the available playbook triggers, see Playbook triggers and tasks on page 265.
4. Add playbook tasks.
Drag-and-drop any connector point to add a new task. The Tasks window is displayed showing available
connectors. See Configuring connectors for automation on page 251.
Connector Select a connector to use from the dropdown menu. See Configuring
connectors for automation on page 251.
7. (Optional) Manage your playbook by clicking on one of the options displayed when hovering your mouse over the
trigger or task:
l Edit: Edit the trigger or task.
Once created, playbooks can be enabled or disabled through the playbook editor. Enabled playbooks will run as soon as
their trigger conditions are met. Playbooks configured with the On_Demand trigger start when manually initiated by the
administrator in Incidents & Events > Automation > Playbook or an Incident's Analysis page.
Playbook templates
When a playbook template is selected, the playbook designer is automatically populated with a trigger and one or more
tasks. You can configure, add, or remove tasks to customize the playbook.
When creating a new playbook, the following predefined templates are available:
FAZ Localhost Compromised Host Playbook to create an incident on FortiAnalyzer compromised hosts
Incident detected by the IoC feature.
Attach Endpoint Playbook to collect the list of endpoint vulnerabilities from logs and
Vulnerability List to attach it to an incident.
Incident
FortiClient EMS Update Asset and Playbook to automatically update FortiAnalyzer Asset and Identity
Identity Database database with endpoint and user information from EMS.
Enrich Incident with Playbook to get running processes on endpoint by EMS connector
Process List and attach to an incident.
Enrich Incident with Playbook to collect the list of endpoint vulnerabilities from logs and
Vulnerability List attach to an incident.
Enrich Incident with Playbook to get software inventory from endpoint by EMS
Software Inventory connector and attach to an incident.
Triggers
Triggers determine when a playbook is to be executed. Triggers are always the first step in a playbook, and each
playbook can only include one trigger. Once a playbook has been triggered, it flows through the remaining tasks as
defined by the routes in the playbook using the trigger as a starting point.
The following playbook triggers are available:
Trigger Description
EVENT_TRIGGER The playbook is run when an event is created that matches the configured filters.
You can configure filters that require All of the following conditions to be met or
Any of the following conditions to be met. When no filters are set, all events will
trigger the playbook.
INCIDENT_TRIGGER The playbook is run when an incident is created that matches the configured
filters.
You can configure filters that require All of the following conditions to be met or
Any of the following conditions to be met. When no filters are set, all incidents will
trigger the playbook.
Tasks
Tasks include automated actions that take place on FortiAnalyzer or devices with configured connectors. See
Configuring connectors for automation on page 251.
Tasks can be linked together in sequences. A task's automated action will only begin once the playbook is triggered and
all preceding connected tasks are complete.
Tasks can be configured with default input values or take inputs from the trigger or preceding tasks. For more information
about linking and configuring tasks in a playbook, see Playbooks on page 262.
FortiOS actions are configured using automation rules created on FortiGate. For more
information on enabling FortiOS actions in tasks, see Configuring connectors for automation
on page 251.
Variables can be used when configuring playbook tasks. There are two types of playbook variables, including output
variables and trigger variables.
For a list of trigger and output variables that can be used when configuring playbook tasks, see FortiAnalyzer Playbook
Variables on the Fortinet Docs Library.
Output variables
Output variables allow you to use the output from a proceeding task as an input to the current task. For example, the
report generated in one task can be attached to an incident in a second task. For a list of output types, see Incidents
& Events > Automation > Connectors. A task ID is created automatically for each task added to the playbook.
Task IDs are not currently displayed within a task. To view a task ID, the following workaround
can be used.
1. Create a new task in the playbook using the Local Connector action Attach Data to
Incident.
2. In the Attachment dropdown, select a preceding task to view its task ID. You can switch to
text mode to copy the value after selection.
Trigger variables allow you to use information from the trigger (starter) of a playbook when it has been configured with an
incident or event trigger.
For example, the Run Report action can include a filter for the endpoint IP address from the event that triggered the
playbook.
Trigger variables use the following format:
Format: ${trigger.<variable>}
Example: ${trigger.epip}
You can import or export playbooks, including the connectors required to support the playbook, by using the right-click
context menu in the playbook dashboard.
To import a playbook:
4. Click OK.
A message is displayed confirming that the playbook was imported successfully.
To export a playbook:
When an imported playbook has the same name as an existing playbook, FortiAnalyzer
will automatically create a new name which includes the import timestamp to avoid a
conflict.
Playbook Monitor
You can view the status of playbook jobs in Incidents & Events > Automation > Playbook Monitor.
You can perform the following actions on the Playbook Monitor table:
l Click Refresh to refresh the table view.
l Select the checkbox for playbook jobs and click Delete to remove them from the table view.
l Use the Search field to find specific playbook jobs.
The Playbook Monitor table includes the following columns:
Column Description
Playbook The name of the playbook as configured in Incidents & Events > Automation >
Playbook .
User Displays the name of the administrator who started the playbook job when
configured with theOn Demand trigger.
Start Time The date and time that the job began.
End Time The date and time that the job ended.
l Success: The job has finished with all tasks completed successfully.
l Failed: The job has finished with one or more tasks failing to complete
successfully.
Details Clicking the Details icon shows the status of each task run by the playbook.
After clicking the Details icon for a playbook job, the Playbook Tasks dialog displays. This dialog provides details about
the tasks, including their status, in a table view.
Task statuses include:
Upstream_failed Failed because the task could not connect with an upstream device.
Playbook jobs that include one or more failed tasks are labeled as Failed in Playbook Monitor, however, individual
actions may have been completed successfully.
Outbreak Alerts
The FortiAnalyzer Outbreak Detection Service is a licensed feature that allows FortiAnalyzer administrators to view
outbreak alerts and automatically download related event handlers and reports from FortiGuard.
When FortiAnalyzer has a valid license for the Outbreak Detection Service, outbreak alerts from Fortinet are displayed in
the Incidents & Events > Outbreak Alerts pane. Outbreak alerts can be viewed from any ADOM. You can navigate
between outbreak alerts using the side bar, grouping the alerts by date or severity. You can also use the search bar to
find specific outbreak alerts. Click the outbreak alert to view the information, and click the download icon to save a PDF
of the alert information. When new outbreak alerts are added, you will receive a notification in the banner.
Outbreak event handlers and reports are created in real-time by Fortinet to detect and respond to emerging outbreaks.
Outbreak reports and event handlers are automatically downloaded so that they are available in your environment. See
Viewing imported event handlers and reports on page 272.
Without a valid license for the Outbreak Detection Service, Outbreak Alerts displays a default alert page, and outbreak
event handlers and reports are not available from FortiGuard. To obtain a valid license for FortiAnalyzer Outbreak
Detection Service, contact Fortinet FortiCare.
With a valid license, the FortiAnalyzer Outbreak Detection Service automatically downloads event handlers and reports
created by Fortinet in response to known outbreaks. Handlers and reports are downloaded from FortiGuard as part of
the FOAS package. This section includes information on how to view downloaded outbreak event handlers and reports.
1. To view the event handlers, go to Incidents & Events > Handlers > Basic Handlers.
Event handlers created by the FortiAnalyzer Outbreak Detection Service are displayed with the Outbreak Alert
prefix. See Event handlers on page 197.
In FortiAnalyzer 7.6.0 and later, these event handlers will also have the Automatically Create Incident option
enabled. The incidents generated by these event handlers can be found in Incidents & Events > Incidents >
Incidents.
2. To view the reports, go to Reports > Report Definitions > All Reports.
l The Outbreak Alert Reports folder includes available reports from the FortiAnalyzer Outbreak Detection
Service. Reports can be run in HTML, PDF, XML, CSV, and JSON output formats. See Generating reports on
page 302.
l In FortiAnalyzer 7.4.2 and later, new reports included in the FOAS package are displayed in the global
Outbreak Alert Reports folder. Outbreak Alert reports released prior to this release remain at the ADOM level.
The global folder and global reports are identified with the system theme's color applied to the icon.
l Outbreak alert reports received as FortiGuard packages display FortiGuard in the Origin column.
FortiAnalyzer's SIEM capabilities parse, normalize, and correlate logs from Fortinet products, Apache and Nginx web
servers, and the security event logs of Windows and Linux hosts (with Fabric Agent integration). The SIEM logs are
displayed in Log View > Logs > All and can be used when generating reports. See Types of logs collected for each
device on page 133.
Parsing is predefined by FortiAnalyzer and does not require manual configuration by administrators. The predefined
SIEM log parsers can be managed in Incidents & Events > Log Parser. This pane includes predefined log parsers and
any custom log parsers that you have imported.
This topic includes information about:
l Log Parsers on page 273
l Assigned Parsers on page 276
Log Parsers
Go to Incidents & Events > Log Parser > Log Parsers to view all available log parsers in the table view. You can expand
or collapse categories of the log parsers in the table.
Column Description
Double-click a log parser in the table view to display the Log View for Log Parser pane. This pane displays all related
SIEM logs for the log parser in a table view.
You can also view the SIEM logs from Log View > Logs > All. Filter the log view by Data
Parser Name = name of the log parser to display the related logs. For example,
filter by Data Parser Name = FortiGate Log Parser to display logs related to the
FortiGate Log Parser.
You can perform the following actions from Incidents & Events > Log Parser > Log Parsers:
Action Description
Import Import a custom log parser. The log parser must be in JSON format.
View Logs Open the Log View for Log Parser pane to display all related SIEM logs in a table
view.
Delete Delete a custom log parser. You cannot delete a predefined log parser.
Action Description
Disable Disable a log parser. You cannot disable a log parser if it is assigned and in use.
Validate Validate a raw log with the selected log parser. You cannot perform the Validate
action with more than one log parser at a time.
Reorder Change the priority of a log parser. In the Change Parser Priority pane, you can
drag and drop the log parsers in the table view to the desired priority.
1. In Incidents & Events > Log Parser > Log Parsers, click Import.
The Import Log Parser dialog displays.
2. Drag and drop or select the log parser.
The log parser must be in the correct format as a JSON file to meet the requirements checked during the import.
3. Click OK.
Once added, the custom log parser will be included in the table view when Show Custom is selected.
1. In Incidents & Events > Log Parser > Log Parsers, select the checkbox for log parser(s).
2. Click Export.
The log parser(s) are exported in JSON format. You can export predefined log parsers to use them as a template for
custom log parsers.
1. In Incidents & Events > Log Parser > Log Parsers, select the checkbox for log parser(s).
2. Click Enable or Disable.
The Enable action is only available when the selected log parsers are disabled.
The Disable action is only available when the selected log parsers are enabled. The action can only be performed
when the log parser is not assigned to any devices.
1. In Incidents & Events > Log Parser > Log Parsers, select the checkbox for a log parser.
2. Click Validate.
The Validate Log Parser pane opens.
3. Enter a log to validate and click Validate.
A Parse Result displays in the Validate Log Parser pane.
Assigned Parsers
Go to Incidents & Events > Log Parser > Assigned Parsers to view the devices/applications and their current log parser
assignments in a table view.
1. In Incidents & Events > Log Parser > Assigned Parsers, click Create New.
The Assign Parser pane displays.
2. From the Device ID dropdown, select a device for the log parser assignment.
3. From the Application dropdown, select an application for the log parser assignment.
4. From the Current Parser dropdown, select the log parser.
The log parser must use the selected Application. See Incidents & Events > Log Parser > Log Parsers to determine
which application is used by the log parser.
5. Click OK.
1. In Incidents & Events > Log Parser > Assigned Parsers, click Create New.
The Change Parser pane displays.
2. From the Current Parser dropdown, select the log parser.
The log parser must use the selected Application. See Incidents & Events > Log Parser > Log Parsers to determine
which application is used by the log parser.
3. Click OK.
The FortiAnalyzer Security Automation Service is a license that provides content packs released from FortiGuard on a
monthly basis. The content packs include premium reports, event handlers, advanced correlation rules, third-party log
parsers, and more. These tools are designed to help you detect, investigate, and respond to security incidents.
For more information about this service, see FortiAnalyzer Security Automation Service on the FortiGuard website.
With a valid Security Automation Service license, the content pack release is applied automatically in FortiAnalyzer
when it is available from the FortiGuard distribution server. The details of the content pack, including the list of log
parsers, event handlers, and/or reports, are available on the FortiGuard website. To find the tools within your licensed
FortiAnalyzer, see Security Automation Service objects on page 277.
To confirm you have a valid Security Automation Service license in FortiAnalyzer, see the License Information widget on
page 58.
The FortiAnalyzer Security Automation Service includes support for the RHSP FortiGuard package which is used to
share updated reports, event handlers, SIEM parsers, and playbooks as content packages. RHSP FortiGuard package
objects are only applied with a valid Security Automation Service license.
You can find the Security Automation Service objects received as part of the RHSP FortiGuard package in the following
places in FortiAnalyzer:
l Reports:
l Reports included in the RHSP package are stored on the global level, and are displayed in the global Security
l Reports delivered by the RHSP package display FortiGuard in the Origin column.
l Event handlers:
l Event handlers delivered by the RHSP package are displayed in Incidents & Events > Event Handlers > Basic
Handlers.
l SIEM parsers:
l SIEM parsers delivered by the RHSP package are displayed in Incidents & Events > Log Parsers, and display
l Playbooks:
l Playbooks delivered by the RHSP package are displayed in Incidents & Events > Automation > Playbook.
FortiAI
FortiAI is a generative AI security assistant that uses FortiGuard lab's high-fidelity security data and is continuously
monitored and improved by FortiGuard Security experts. Administrators can use the FortiAI Assistant to answer
questions and get help with configurations using FortiAI's advanced natural language processing capabilities.
FortiAI can be used in FortiAnalyzer for incident investigation, response, and threat hunting. The assistant can interpret
security events, generate detailed summaries, identify potential impacts, and make remediation recommendations.
FortiAI can also simplify platform usage with natural language prompts. For example, the assistant can create complex
database queries, generate reports, write event handler and correlation rules, and execute many other FortiAnalyzer
functions during typical workflow. For more information, see Using FortiAI on page 281.
FortiAI can be accessed from the following areas in the FortiAnalyzer GUI:
l The FortiAI icon in the banner from any page in the GUI.
l The FortiAI module in the FortiAnalyzer tree menu.
In order to use FortiAI, FortiAnalyzer must have a valid FortiAI license. FortiAI license information can be viewed in
Dashboards > Status in the License Information widget. See the FortiAnalyzer Datasheet and FortiAI tokens on page
285 for more information about licensing.
When licensed, FortiAI can be accessed by up to a maximum of three local administrators on the FortiAnalyzer. You can
configure which administrators can use the FortiAI service using the FortiAnalyzer CLI. See Enabling administrator
access to FortiAI on page 280.
You can enable administrator access to FortiAI using the GUI or the CLI. FortiAI capabilities can only be enabled for local
administrators.
When attempting to enable FortiAI access on more than three administrators or on a non-local user, an error
message is displayed.
1. In the FortiAnalyzer CLI, use the following commands to enable or disable this feature for an admin:
config system admin user
edit <administrator>
set fortiai {disable | enable}
Using FortiAI
The FortiAI assistant can be used to navigate the GUI and perform actions. It can also be used to answer questions and
query data.
The FortiAI assistant is operated using prompts. You can use natural language to request actions or information from the
FortiAI assistant. If you enter a prompt that the FortiAI assistant does not understand, it will ask for more details to clarify
your request. Responses from the FortiAI assistant may also include suggestions and requests for you to consider. For
example, after responding to a query for information, the FortiAI assistant may ask if you would like help performing a
related action, such as filtering log view or creating an event handler.
The FortiAI assistant's responses can include text, images, widgets, and data retrieved directly from your FortiAnalyzer
environment.
If you log out, close, or reload your session, you will not be able to continue your current thread
with the FortiAI assistant. For example, you will not be able to reference a chart the FortiAI
assistant in the current thread after reloading.
Category Description
Incident detection FortiAI can help to create event handlers and event handler rules for incident
detection. The event handlers can be created automatically according to your
prompts, and the rules are customized to your environment.
For example, during log analysis, if you find a suspicious log and want to get
informed of similar occurrences, you can send the following prompt to FortiAI:
"Keep me updated with same log happening again." FortiAI will automatically help
to create an event handler for this kind of log.
Incident investigation FortiAI can help to gather relevant information from multiple places in the
FortiAnalyzer GUI. In addition, FortiAI can provide the context for the information,
such as the threat information and the affected assets.
Using these queries, you can perform an interactive investigation with FortiAI by
asking follow-up questions, refining queries for information, and exploring
different aspects of the incident to discover correlations within a single thread.
Incident response FortiAI is integrated with playbooks and connectors for incident response
automation. FortiAI can also support with post-incident reviews and compliance
by generating detailed incident reports.
Using these queries, you can collect many details related to the incident, including
targeted endpoint information, event details, critical incident information, and the
impact explanations. This information can be used to determine the root cause of
the security threat and to initiate response measures.
Visibility and insights FortiAI can generate custom charts and reports from the available log data. You
can specify data sources, parameters, and choose the visualation type through a
guided process with FortiAI.
When using FortiAI, your prompts should be directly related to the information the assistant is programmed to access,
enabling efficient and effective data retrieval.
A valid prompt is a clear, well-defined question that the FortiAI assistant can easily interpret and process. It should be
specific and relevant to the data or queries the FortiAI assistant is designed to handle. A valid prompt can be translated
into precise SQL queries to retrieve accurate results.
An invalid prompt is one that cannot be easily interpreted or processed by the FortiAI assistant. This typically includes
prompts that are ambiguous, lack sufficient detail, or are outside the scope of the FortiAI assistant’s capabilities.
The above examples use full sentences. However, in general, using more text means using
more tokens. To more efficiently use tokens, keep your prompts concise.
For more information about tokens, see FortiAI tokens on page 285.
Section Description
Toolbar Click an icon to perform the related action or open the related dialog.
Download Chat Download the current chat thread in HTML or PNG format.
History
Thread Displays your prompts and the FortiAI assistant’s responses for the current
thread.
At the bottom of responses from the FortiAI assistant, click the help icon to display
the function callback results.
Prompt Enter a prompt for the FortiAI assistant, and then click send. Alternatively, you can
click the microphone icon to speak a prompt for the FortiAI assistant.
When available, suggested prompts display above the text box. You can click
these suggestions to prompt the FortiAI assistant.
Monthly token usage Displays the percentage of monthly tokens used for the current month. For more
information, see FortiAI tokens on page 285.
FortiAnalyzer and FortiAI protects your data using a multi-layered approach of function callbacks, data masking, and a
secure proxy.
Function Callback: Your prompts are sent to the large language model (LLM), which generates a query that
FortiAnalyzer can understand. This query is then executed on your local host, ensuring that results are processed
locally.
Data Masking: Sensitive information such as IP addresses, MAC addresses, and usernames are automatically masked
before being sent to the LLM, as the model does not need this data to form the query. When the function call returns to
the local host, the data is unmasked.
For example:
l Prompt from Admin: "Give me the statistics of malware activities detected today from endpoint 192.168.50.20?"
l Masked data sent from FortiAnalyzer: "Give me the statistics of malware activities detected today from endpoint
12.198.37.2?"
In this example, 12.198.37.2 is an auto-generated, irrelevant IP address based on the session cookie.
Note that different values are masked using different methods within FortiAnalyzer; for instance, IP addresses are
masked differently than usernames. The masked values also depend on the session cookie, ensuring that every session
uses a different key to mask and protect data.
FortiAI Proxy: All FortiAI prompts pass through the Fortinet FortiAI proxy before reaching the cloud, where additional
checks are performed to ensure your data is protected.
Example
1. The Admin enters a prompt in the FortiAnalyzer FortiAI Assistant.
For example: "How much YouTube did 192.168.4.199 watch today?"
The question is passed through the FortiAI proxy. Sensitive data, such as the IP, is automatically masked before it
leaves FortiAnalyzer.
2. The LLM analyzes the question, determining the correct function to answer the prompt.
3. The LLM sends the function callback through the FortiAI proxy to FortiAnalyzer.
4. FortiAnalyzer unmasks the data and queries the database according to the function callback.
5. FortiAnalyzer replies to the Admin in the FortiAI Assistant.
For example:
"Here are today's statistics for IP 192.168.4.199 access to YouTube based on the logs:
l Log Count: 1803
l Percentage of Total: 99.83%
l Total Sent Bytes: 10.5 MB
l Average Session Duration: 00h 01m 52s
If there is further need to protect data from administrators, including the FortiAI users, you can also use the Privacy
Masking feature in administrator profiles. This feature allows you to encrypt and anonymize data for administrators,
further protecting user privacy according to your requirements. For more information, see Privacy Masking on page 426.
FortiAI tokens
When FortiAnalyzer is licensed for FortiAI, the license will include a monthly entitlement for tokens that is shared by all
FortiAI users.
Tokens are used in large language models (LLMs) to process text and quantify usage. Tokens usage is calculated using
the following guidelines:
l When you use the FortiAI assistant, the text in both the prompt (input) and the response (output) is processed as
tokens.
l While there is not a one-to-one relationship between words or characters and tokens, in general, more text in the
query and response means using more tokens.
l Because the FortiAI assistant uses session history to inform it's responses, queries that are a part of a long session
will use more tokens than new conversations.
Consider the following two queries:
l Can you show me all the log entries for the endpoint 10.10.10.10?
l Show logs for 10.10.10.10 (Past week).
The total amount of tokens used in the above examples is based on input (prompt) plus output (response). The first
prompt uses more text, which means it will use more tokens in the input. The first prompt will also generate a larger
response from FortiAI because it asks for "all log entries" rather than limiting the response to logs from the "Past week"
only. Thus, the first prompt will use a greater number of tokens in the output as well.
For example, see below for a simple calculation of tokens used for each query. Note that the number of tokens are for the
example, and do not reflect actual amounts to be used by these queries.
l Tokens used by first query = 20 (input) + 2000 (output)
l Tokens used by second query = 10 (input) + 1000 (output)
It would also be important to consider how long the thread is when these queries are made. The longer the thread gets,
the more the number of tokens will be consumed.
Best practices
To ensure you are using your monthly allocation of tokens effectively, consider implementing best practices for FortiAI
users. For example:
l Make your prompts concise and specific. In terms of token usage, the prompt "Can you show me all the log entries
for endpoint 10.10.10.10 from the past week?" is less effective than "Show recent logs for 10.10.10.10 (Past week)"
because the former prompt uses more text than the latter.
l Use filters in your prompts to receive concise and specific responses. For example, include time ranges or specify a
limit for the number of results.
l Use words that relate to functions existing in FortiAnalyzer. For example, using "apply filter" or "generate report"
concisely tells the FortiAI assistant what action is required.
l Leverage predefined datasets, charts, reports, and event handlers whenever possible. You can more efficiently use
FortiAI by referencing existing tools in your prompts.
l Reference details in the existing thread when possible. This reduces redundancy and allows you to be concise and
specific as you build upon previous prompts. However, note that the FortiAI assistant will not remember previous
threads.
l Restart the AI assistant after 10 conversations if you don't need to keep the historical context.
The monthly token usage is displayed at the bottom of the FortiAI pane in FortiAnalyzer. Mouse over the Monthly token
usage % to view the following in a tooltip:
l Current Chat Session Token Usage
l Current Monthly Token Usage
l Total Monthly Entitled Tokens
You can prompt FortiAI for suggestions and with questions when needed. For example, you
can prompt FortiAI to list what tasks it can help with:
FortiAI can guide you through analyzing logs and applying filters to refine your search. You can filter using specific
criteria such as IP addresses, event actions, threat types, and more. You can also apply filters based on time ranges.
1. Prompt FortiAI to list the destination IP addresses for top threats in the past 7 days.
The FortiAI assistant responds with a list of the addresses, as well as a brief analysis and mitigation
recommendations.
FortiAI can investigate external IP addresses for their security reputation using FortiGuard and VirusTotal.
1. Prompt FortiAI to perform a security reputation check for an IP address.
2. If it is not provided in the initial response, you can then prompt FortiAI to provide mitigation recommendations.
FortiAI can render charts to create visual representations of the log data. This can be done using pie charts or bar charts.
You can aggregate and group data in these charts based on various fields in FortiAnalyzer. For example:
1. Prompt FortiAI to generate a pie chart based on source IPs that were connected to the malicious IP identified above.
1. Prompt FortiAI to create an event handler connecting to the malicious IP identified above.
Prompt FortiAI to continue with the task, as needed.
When the FortiAI assistant creates the event handler, it provides the event handler name and a summary of the rule
configuration.
2. After it is created, you can review and edit the event handler.
FortiAI can create, update, and track incidents, including generating reports and adding notes to existing incidents.
FortiAI can also identify the compromised hosts.
1. Prompt FortiAI to provide a list of incidents created in the past 24 hours.
2. Prompt FortiAI to provide more details about a specific incident in the list.
FortiAI can get a list of running processes on the server for investigation purposes. As in the example below, you can
prompt FortiAI to help with the analysis.
3. If the analysis is not included in the previous response, prompt FortiAI for a analysis of the suspicious process(es).
FortiAI can help prevent and mitigate threats by quarantining endpoints using IP addresses.
2. To save the incident report, click the download icon in the response.
You can generate data reports from logs by using the Reports feature. You can do the following:
l Use predefined reports. Predefined report templates, charts, and macros are available to help you create new
reports.
l Create custom reports.
Report files are stored in the reserved space for the FortiAnalyzer device. See Automatic deletion on page 154.
When rebuilding the SQL database, Reports are not available until the rebuild is completed.
Select the Show Progress link in the message to view the status of the SQL rebuild.
For more information on FortiAnalyzer report technology and troubleshooting report performance issues, see the
FortiAnalyzer Report Performance Troubleshooting Guide.
When ADOMs are enabled, each ADOM has its own reports, libraries, and advanced settings. Make sure you are in the
correct ADOM before selecting a report. See Switching between ADOMs on page 31.
Some reports are available only when ADOMs are enabled. For example, ADOMs must be enabled to access
FortiCarrier, FortiCache, FortiClient, FortiDDoS, FortiMail, FortiSandbox, and FortiWeb reports. In a Security Fabric
ADOM, all reports are displayed.
You cannot import reports to ADOMs that do not match the device type used in the charts and datasets for the report.
Fabric ADOMs support all reports, regardless of the device type used in the charts and datasets. For example, a
FortiGate report cannot be imported to an ADOM for a different device type; it can only be imported to a FortiGate or
Fabric ADOM.
You can configure and generate reports for these devices within their respective default ADOM or a Security Fabric
ADOM. These devices also have device-specific charts and datasets.
Chart 5000
Dataset 5000
Macro 5000
Layout 2000
Schedule 2000
Layout-folder 100
Output 2000
FortiAnalyzer includes a number of predefined elements you can use to create and/or build reports.
Reports Reports > Report Definitions > All You can generate reports directly or with minimum
Reports setting configurations. Predefined reports are actually
report templates with basic default setting configurations.
Templates Reports > Report Definitions > You can use directly or build upon. Report templates
Templates include charts and/or macros and specify the layout of
the report. A template populates the Layout tab of a
report that is to be created. See List of report templates
on page 320.
Charts Reports > Report Definitions > Chart You can use directly or build upon a report template you
Library are creating, or in the Layout tab of a report that you are
creating. Charts specify what data to extract from logs.
Macros Reports > Report Definitions > Macro You can use directly or build upon a report template that
Library you are creating, or in the Layout tab of a report that you
are creating. Macros specify what data to extract from
logs.
Reports uses Analytics logs to generate reports. Archive logs are not used to generate reports. For more information,
see Data policy and automatic deletion on page 43.
You can use the Report Guidance feature to make sure the appropriate Analytics logs are available for a custom or
predefined report. For more information, see Report guidance on page 302.
For reports about users, the FortiGate needs to populate the user field in the logs sent to FortiAnalyzer.
Reports include charts and/or macros. Each chart and macro is associated with a dataset. When you generate a report,
the dataset associated with each chart and macro extracts data from the logs and populates the charts and macros.
Each chart requires a specific log type.
FortiAnalyzer includes a number of predefined charts and macros. You can also create custom charts and macros.
When you generate a report, it can take days to assemble the required dataset and produce the report, depending on the
required datasets. Instead of assembling datasets at the time of report generation, you can enable the auto-cache
feature for the report. Auto-cache is a setting that tells the system to automatically generate hcache.
hcache is a proprietary FortiAnalyzer caching system that stays on the disk in the form of a database table. Unlike other
caches, hcache tables are persistent and are not removed based on a set period of time.
When a database table is rolled, it becomes "mature", meaning the table will not grow any more. Because the tables will
not grow, it is unnecessary to query the database table each time for the same SQL query. hcache runs queries on these
matured database tables in advance and caches the interim results of each query. When it is time to generate the report,
much of the datasets are already assembled, and the system only needs to merge the results from hcaches. This
reduces report generation time significantly.
The auto-cache process uses system resources to assemble and cache the datasets and it takes extra space to save
the query results. You should only enable auto-cache for reports that require a long time to assemble datasets.
Generating reports
You can generate reports by using one of the predefined reports or by using a custom report that you created. You can
find all the predefined reports and custom reports listed in Reports > Report Definitions > All Reports.
Click the icon in the Config Recommendation column to determine if the appropriate Analytics
logs are available for the report. For more information, see Report guidance on page 302.
To generate a report:
Report guidance
You can use the Report Guidance feature to determine if FortiAnalyzer has the appropriate Analytics logs available for a
report.
If Analytics logs are not available for a chart or macro used in the report, it will display No Data in the report output. For
example, the Analytics logs may not be available if;
l logging is not enabled correctly on the device,
l the log requires a FortiGuard license and you do not have one,
After you generate reports, you can view completed reports in Reports > Generated Reports or Reports > Report
Definitions > All Reports. You can view reports in the following formats: HTML, PDF, XML, CSV, and JSON.
Enabling auto-cache
You can enable auto-cache to reduce report generation time for reports that require a long time to assemble datasets.
For information about auto-cache and hcache, see How auto-cache works on page 302.
You can see the status of building the cache in Reports > Report Definitions > All Reports in the Cache Status column.
To enable auto-cache:
Grouping reports
If you are running a large number of reports which are very similar, you can significantly improve report generation time
by grouping the reports. Grouping reports has these advantages:
l Reduce the number of hcache tables.
l Improve auto-hcache completion time.
l Improve report completion time.
For example, to group reports with titles containing string Security_Report by device ID and VDOM, enter the
following CLI commands:
config system report group
edit 0
set adom root
config group-by
edit devid
next
edit vd
next
end
set report-like Security_Report
next
end
Notes:
l The report-like field specifies the string in report titles that is used for report grouping. This string is case-
sensitive.
l The group-by value controls how cache tables are grouped.
l To view report grouping information, enter the following CLI command, then check the Report Group column of the
table that is displayed.
execute sql-report list-schedule <ADOM>
Once you start to run a report, FortiAnalyzer creates a log about the report generation status and system performance.
Use this diagnostic log to troubleshoot report performance issues. For example, if your report is very slow to generate,
you can use this log to check system performance and see which charts take the longest time to generate.
For information on how to interpret the report diagnostic log and troubleshoot report performance issues, see the
FortiAnalyzer Report Performance Troubleshooting Guide.
1. In Reports > Generated Report, right-click the report and select Retrieve Diagnostic to download the log to your
computer.
2. Use a text editor to open the log.
Auto-Generated Reports
The Cyber Threat Assessment report is automatically generated. By default, the report will run at 3:00AM every Monday.
For more information on report scheduling, see Scheduling reports on page 305.
Schedules can be viewed in the Report Calendar. See Report calendar on page 341.
This will only affect newly installed FortiAnalyzer or newly created ADOM. Upgraded ADOM
reports, scheduling and calendar will be kept as is.
Scheduling reports
You can configure a report to generate on a regular schedule. Schedules can be viewed in the Report Calendar. See
Report calendar on page 341.
To schedule a report:
Creating reports
You can create reports from report templates, by cloning and editing predefined/existing reports, or start from scratch.
You can create a new report from a template. The template populates the Layout tab of the report. The template
specifies what text, charts, and macros to use in the report and the layout of the content. Report templates do not contain
any data. Data is added to the report when you generate the report.
4. In the Name box, type a name for the new report. The following characters are NOT supported in report names: \ / " '
<>&,|#?%$+
5. Select From Template for the Create from setting, then select a template from the dropdown list. The template
populates the Layout tab of the report.
6. Select the folder that the new report will be saved to from the dropdown list. You can click the add button to include
additional folder locations. See Organizing reports into folders on page 317
7. Select OK to create the new report.
8. On the Settings tab, configure the settings as required. For a description of the fields, see Reports Settings tab on
page 308.
9. Optionally, go to the Layout tab to customize the report layout and content. For a description of the fields, see
Reports Editor tab on page 312.
10. Click Apply to save your changes.
You can create reports by cloning and editing predefined and/or existing reports.
To create a custom cover page, you must select Print Cover Page in the Advanced
Settings menu.
9. On the Layout tab, you can specify the charts and macros to include in the report, as well as report content and
layout.
For a description of the fields, see Reports Editor tab on page 312.
For information about creating charts and macros, see Creating charts on page 326 and Creating macros on page
329.
10. Click Apply to save your changes.
Field Description
Time Zone The time zone to use for data in the report.
The Default time zone is the time zone set for the FortiAnalyzer. For more information, see
Configuring the system time on page 48.
Previous time period filters can include up to the previous days data at
the latest, and do not include data from the current day. This ensures
that data is not missed during report generation and that scheduled
reports using these filters include a consistent time period.
Devices The devices to include in the report. Select either All Devices or Specify to add specific
devices. Select the add icon to select devices.
Subnets Select All Subnets to include all subnets, or select Specify to include/exclude subnets as a
filter for this report. See Subnets on page 168.
Type Select either Single Report (Group Report) or Multiple Reports (Per-Device).
This option is only available if multiple devices are selected.
Enable Auto-Cache Select to assemble datasets before generating the report and as the data is available.
This process uses system resources and is recommended only for reports that require
days to assemble datasets. Disable this option for unused reports and for reports that
require little time to assemble datasets.
Extended Log Enable to cache the following log fields for faster filtering.
Filtering l Device ID
l Source Endpoint ID
l Source IP
l Source User ID
l Destination IP
Field Description
Enter a number for the frequency of the report based on the time period selected from the
dropdown list.
Start time Enter a starting date and time for the file generation.
End time Enter an ending date and time for the file generation, or set it to never ending.
Output Profile Select the output profile from the dropdown list, or click Create New to create a new output
profile. See Output profiles on page 337.
The following options are available in the Advanced Settings section of the Settings tab.
Field Description
Bundle rest into “Others” Select to bundle the uncategorized results into an Others category.
Chart Heading Level Set the heading level for the chart heading.
Layout Header Enter header text and select the header image. Accept the default Fortinet image
or click Browse to select a different image.
Layout Footer Select either the default footer or click Custom to enter custom footer text in the
text field.
Print Cover Page Select to print the report cover page. Click Customize to customize the cover
page. See Customizing report cover pages on page 310.
Print Device List Select to print the device list. Select Compact, Count, or Detailed from the
dropdown list.
Print Report Filters Select to print the filters applied to the report.
Field Description
Allow Save Maximum Select a value between 1-10000 for the maximum number of reports to save.
Color Code The color used to identify the report on the calendar. Select a color code from the
dropdown list to apply to the report schedule. Color options include: Bold Blue,
Blue, Turquoise, Green, Bold Green, Yellow, Orange, Red, Bold Red, Purple, and
Gray.
Enable Report Filter Caching Select to accelerate processing speed when generating multiple reports. In this
case, all filters are applied when querying the hcache table. This is the default.
De-select to improve report accuracy. In this case, the filters are put inside the
hcache to increase data accuracy. However, this will also impact performance.
Enable High Accuracy Select to increase the maximum hcache rows, increasing data accuracy.
Caching You can show, set, or reset the maximum number of rows for high-accuracy
hcache by entering the following command in the FortiAnalyzer CLI:
diagnose sql config hcache-max-high-accu-row [reset | set
<integer>]
De-select to use the default number of hcache rows, increasing system
performance. This is the default.
You can show, set, or reset the default number of hcache rows by entering the
following command in the FortiAnalyzer CLI:
diagnose sql config hcache-max-rpt-row [reset | set
<integer>]
A report cover page is only included in the report when enabled on the Settings tab in the Advanced Settings section.
When enabled, the cover page can be customized to contain the desired information and imagery.
Background Image Click Select Image to open the Select Image? dialog.
Select an image or click Browse to find an image on the management
computer, then click OK to add the image as the background image of the
cover page. Alternatively, you can select No Image.
Top Image Click Select Image to open the Select Image? dialog.
Select an image or click Browse to find an image on the management
computer, then click OK to add the image at the top of the cover page.
Alternatively, you can select No Image.
Top Image Position Select the top image position from the dropdown menu. Select one of the
following: Left, Center, Right.
Show Creation Time Select to print the report date on the cover page.
Show Data Range Select to print the data range on the cover page.
Report Title Accept the default title or type another title in the Report Title field.
Custom Text 1 If you want, enter custom text for the Custom Text 1 field.
Custom Text 2 If you want, enter custom text for the Custom Text 2 field.
Bottom Image Click Select Image to open the Select Image? dialog.
Select an image or click Browse to find an image on the management
computer, then click OK to add the image to the bottom of the cover page.
Footer Left Text If you want, enter custom text to be printed in the left footer of the cover page.
Footer Right Text If you want, enter custom text to be printed in the right footer of the cover page.
Footer Background Color Select the cover page footer background color from the dropdown list.
Reset to Default Select to reset the cover page settings to their default settings.
Because the cut, copy, and paste functions need access to the clipboard of your operating
system, some Internet browsers either block it when called from the layout editor toolbar, or
ask you to explicitly agree to it. If you’re blocked from accessing the clipboard by clicking the
respective cut, copy, and paste buttons from the toolbar or context menu, you can always use
keyboard shortcuts.
The following options are available in the Editor tab (layout editor):
Field Description
Insert Chart or Edit Chart Click to insert a FortiAnalyzer chart. Charts are associated with datasets that
extract data from logs for the report.
In the Insert Chart or Chart Properties dialog box, you can specify a custom title,
width, and filters for the chart. For information on setting filters, see Filtering report
output on page 314.
You can edit a chart by right clicking the chart in the layout editor and selecting
Chart Properties or by clicking the chart to select it and then clicking Edit Chart.
Insert Macro Click to insert a FortiAnalyzer macro. Macros are associated with datasets that
extract data from logs for the report.
Image Click the Image button in the toolbar to insert an image into the report layout.
Right-click an existing image to edit image properties.
Table Click the Table button in the toolbar to insert a table into the report layout. Right-
click an existing table to edit a cell, row, column, table properties, or delete the
table.
Insert Page Break for Printing Click to insert a page break for printing.
Link Click the Link button in the toolbar to open the Link dialog box. You can select to
insert a URL, a link to an anchor in the text, or an email address.
Anchor Click the Anchor button in the toolbar to insert an anchor in the report layout.
Cut To cut a text fragment, start with selecting it. When the text is selected, you can
cut it using one of the following methods:
l Click the cut button in the toolbar
Copy To copy a text fragment, start with selecting it. When the text is selected, you can
copy it using one of the following methods:
l Click the copy button in the toolbar
Paste To paste text, start with cutting or copying from within the editor or from another
source. Once the text is cut or copied, you can paste it in the editor using one of
the following methods:
l Click the paste button in the toolbar
Field Description
l Use the CTRL+V shortcut on your keyboard.
Undo Click to undo the last action. Alternatively, use the CTRL+Z keyboard shortcut to
perform the undo operation.
Redo Click to redo the last action. Alternatively, use the CTRL+Y keyboard shortcut to
perform the redo operation.
Find Type text in the search field, and then click Find to highlight instances of that text
in the editor. The instances of that text will be highlighted one at a time, starting at
the top of the editor. The search field is not case-sensitive.
Replace This is only actionable when text has been highlighted using the Find button. Type
the replacement text in the replace field, and then click Replace to put it in place of
the highlighted text.
Replace All This is only actionable when text has been highlighted using the Find button. Type
the replacement text in the replace field, and then click Replace All to put it in
place of all instances of the text in the Find field.
Paragraph Format Select the paragraph format from the dropdown list. Select one of the following:
Normal, Heading 1, Heading 2, Heading 3, Heading 4, Heading 5, Heading 6.
Font Size Select the font size from the dropdown list. Select a size ranging from 8 to 72.
Bold Select the text fragment and then click the Bold button in the toolbar. Alternatively,
use the CTRL+B keyboard shortcut to apply bold formatting to a text fragment.
Italic Select the text fragment and then click the Italic button in the toolbar. Alternatively,
use the CTRL+I keyboard shortcut to apply italics formatting to a text fragment.
Underline Select the text fragment and then click the Underline button in the toolbar.
Alternatively, use the CTRL+U keyboard shortcut to apply underline formatting to
a text fragment.
Strike Through Select the text fragment and then click the Strike Through button in the toolbar.
Subscript Select the text fragment and then click the Subscript button in the toolbar.
Superscript Select the text fragment and then click the Superscript button in the toolbar.
Text Color You can change the color of text in the report by using a color palette. To choose a
color, select a text fragment, click the Text Color button in the toolbar, and select a
color.
Background Color You can also change the color of the text background.
Field Description
Decrease Indent To decrease the indentation of the element, click the Decrease Indent toolbar
button. The indentation of a block-level element containing the cursor will
decrease by one tabulator length.
Increase Indent To increase the indentation of the element, click the Increase Indent toolbar
button. The block-level element containing the cursor will be indented with one
tabulator length.
Block Quote Block quote is used for longer quotations that are distinguished from the main text
by left and right indentation. It is recommended to use this type of formatting when
the quoted text consists of several lines or at least 100 words.
Align Left When you align your text left, the paragraph is aligned with the left margin and the
text is ragged on the right side. This is usually the default text alignment setting for
the languages with left to right direction.
Center When you center your text, the paragraph is aligned symmetrically along the
vertical axis and the text is ragged on the both sides. This setting is often used in
titles or table cells.
Align Right When you align your text right, the paragraph is aligned with the right margin and
the text is ragged on the left side. This is usually the default text alignment setting
for the languages with right to left direction.
Justify When you justify your text, the paragraph is aligned to both the left and right
margins and the text is not ragged on either side..
Field Description
Field Description
Select All to filter log messages based on all of the added conditions, or select
Any of the Following Conditions to filter log messages based on any one of the
conditions.
Add Filter Click to add filters. For each filter, select a log field and operator from the
dropdowns, and then enter or select the value(s).
l Log Field: Select a log field from the dropdown. The available log fields
You cannot create multiple filters using the same Log Field. If
multiple entries for the same field are required, use a comma
without a space as a separator in the Value field. For example,
l Log Field: Interface (intf)
The Settings and Layout tabs use the same Log Field list to
filter output; however, some log fields are not used in charts.
The Log Field you use to filter a report may not apply to the log
fields in a chart.
Field Description
If both chart and report filters are selected for the same report, the chart filter will be used
instead of the report filter.
Managing reports
You can manage reports by going to Reports > Report Definitions > All Reports. Some options are available as buttons
on the toolbar. Some options are available in the right-click menu. Right-click a report to display the menu.
Option Description
Create New Creates a new report. You can choose whether to base the new report on a report
template.
Disable Schedule Disable the schedule for the selected report. You can enable schedules, if
needed, by editing the report.
Remove from Remove the selected report from its current folder.
Folder
Assign to Folder Assign the selected report(s) to a folder. From the dropdown menu, select an
existing report folder. Click the add icon to add an additional folder. When multiple
folders are selected, reports are included in both folders.
Option Description
Delete Folder Delete the currently selected folder. Folders which include reports cannot be
deleted.
Show Scheduled Only Filters the list to include only reports that have been run or are scheduled to be
run.
This setting is only available in the toolbar.
FortiAnalyzer reports are organized into default folders. You can create additional folders to organize reports. Reports
can be assigned to multiple folders, and folders can be nested.
4. Specify the folder name and location and click OK. The folder is now displayed in the report list.
5. You can now drag-and-drop, move, assign, create, clone, or import reports into this folder. See Managing reports on
page 316.
You can transport a report between FortiAnalyzer units and ADOMs. You can export a report from the FortiAnalyzer unit
to the management computer. The report is saved as a .dat file on the management computer. You can then import the
report file to another FortiAnalyzer unit or ADOM.
To export reports:
To import reports:
Because the cut, copy, and paste functions need access to the clipboard of your operating
system, some Internet browsers either block it when called from the layout editor toolbar, or
ask you to explicitly agree to it. If you’re blocked from accessing the clipboard by clicking the
respective cut, copy and paste buttons from the toolbar or context menu, you can always use
keyboard shortcuts.
A report template defines the charts and macros that are in the report, as well as the layout of the content.
You can create a report template by saving a report as a template or by creating a totally new template.
You can view sample reports for predefined report templates to help you visualize how the reports would look.
You can manage report templates in Reports > Report Definitions> Templates. Some options are available as buttons
on the toolbar. Some options are available in the right-click menu. Right-click a template to display the menu.
Option Description
Edit Edits a report template. You can edit report templates that you created. You
cannot edit predefined report templates.
View Displays the settings for the predefined report template. You can copy elements
from the report template to the clipboard, but you cannot edit a predefined report
template.
Delete Deletes the selected report template. You cannot delete predefined report
templates.
FortiAnalyzer includes report templates you can use as is or build upon when you create a new report. FortiAnalyzer
provide different templates for different devices.
You can find report templates in Reports > Report Definitions > Templates.
Template - Application Risk and Control Template - Self-Harm and Risk Indicators Report
Template - Detailed Application Usage and Risk Template - Top 20 Categories and Applications
(Bandwidth)
Template - High Bandwidth Application Usage Report Template - Top 20 Categories and Applications (Session)
Template - SaaS Application Usage Report Template - Top Allowed and Blocked with Timestamps
Template - 360-Degree Security Review Template - Operational Technology (OT) Security Risk
Report
Template - 360 Security Report Template - PCI DSS 3.2.1 Security Rating Report
Template - Data Loss Prevention Detailed Report Template - Security Events and Incidents Summary
Template - FortiClient Vulnerability Scan Report from Template - Web Usage Report
FortiGate
Template - FSBP Security Rating Report Template - Web Usage Summary Report
Template - HIPAA Compliance Security Rating Report Template - What is New Report
Template - ISO 27001:2022 Compliance Security Rating Template - Wireless PCI Compliance
Report
Template - Admin and System Events Report Template - Secure SD-WAN Assessment Report
This topic provides an example for creating a report from a template. This topic also provides a brief explanation of the
report used in the example: the Shadow IT Report.
3. In the Preview column for the report, click HTML or PDF to view the sample report in that format.
For example, see page 1 of the report in PDF below.
The Shadow IT Report provides enhanced visibility and control for cloud based applications.
1. Go to Reports > Report Definitions > All Reports, and double-click the row for the Shadow IT Report.
The Edit: Shadow IT Report pane opens.
2. In the Generated Reports tab, click Run Report.
3. When the report is available, click the Format to open the report in.
Chart library
Use the Chart library to create, edit, and manage your charts.
In a Security Fabric ADOM, you can insert charts from all device types into a single report.
Creating charts
You can also create charts using the Log View Chart Builder. See Creating charts with Chart
Builder on page 147.
To create charts:
4. Configure the settings for the new chart, the click OK.
Dataset Select a dataset from the dropdown list. For more information, see Datasets
on page 331. Options vary based on device type.
Resolve Hostname Select to resolve the hostname. Select one of the following: Inherit, Enabled,
or Disabled.
Chart Type Select a graph type from the dropdown list; one of: Table, Bar, Pie, Line, Area,
Donut, or Radar. This selection affects the rest of the available selections.
Data Bindings The data bindings vary depending on the chart type selected.
Table
Add Column Select to add a column. Up to 15 columns can be added for a Regular table.
Ranked tables have two columns, and Drilldown tables have three columns.
l Add Data Binding: Add data bindings to the column. Every column must
have at least one data binding. The maximum number varies depending
on the table type.
Order By Select what to order the table by. The available options vary depending on the
selected dataset.
Show Top Enter a numerical value. Only the first ‘X’ items are displayed. Other items can
be bundled into the Others category for Ranked and Drilldown tables.
Drilldown Enter a numerical value. Only the first ‘X’ items are displayed. This options is
Top only available for Drilldown tables.
Bar
X-Axis l Data Binding: Select a value from the dropdown list. The available options
vary depending on the selected dataset.
l Label: Enter a label for the axis.
l Show Top: Enter a numerical value. Only the first ‘X’ items are displayed.
Other items are bundled into the Others category.
Y-axis l Data Binding: Select a value from the dropdown list. The available options
vary depending on the selected dataset.
l Format: Select a format from the dropdown list: Bandwidth, Counter,
Default, Percentage, or Severity.
l Label: Enter a label for the axis.
Bundle rest Select to bundle the rest of the results into an Others category.
into "Others"
Group By l Data Binding: Select a value from the dropdown list. The available options
vary depending on the selected dataset.
l Show Top: Enter a numerical value. Only the first ‘X’ items are displayed.
Other items can be bundled into the Others category.
Category l Data Binding: Select a value from the dropdown list. The available options
vary depending on the selected dataset.
l Label: Enter a label for the axis.
l Show Top: Enter a numerical value. Only the first ‘X’ items are displayed.
Other items can be bundled into the Others category.
Series l Data Binding: Select a value from the dropdown list. The available options
vary depending on the selected dataset.
l Format: Select a format from the dropdown list: Bandwidth, Counter,
Default, Percentage, or Severity.
l Label: Enter a label for the axis.
Bundle rest Select to bundle the rest of the results into an Others category.
into "Others"
Line or Area
X-Axis l Data Binding: Select a value from the dropdown list. The available options
vary depending on the selected dataset.
l Format: Select a format from the dropdown list: Default, or Time.
l Label: Enter a label for the axis.
Lines l Data Binding: Select a value from the dropdown list. The available options
vary depending on the selected dataset.
l Format: Select a format from the dropdown list: Bandwidth, Counter,
Default, Percentage, or Severity.
l Type: Select the type from the dropdown list: Line Up or Line Down.
l Legend: Enter the legend text for the line.
Managing charts
Manage your charts in Reports > Report Definitions > Chart Library. Some options are available as buttons on the
toolbar. Some options are available in the right-click menu. Right-click a chart to display the menu.
Option Description
Edit Edits a chart. You can edit charts that you created. You cannot edit predefined
charts.
View Displays the settings for the selected predefined chart. You cannot edit a
predefined chart.
Delete Deletes the selected chart. You can delete charts that you create. You cannot
delete predefined charts.
Option Description
View Options Select or deselect the checkboxes to show or hide FortiGuard, Built-in, and
Custom charts in the table view.
Search Lets you search for a chart name. You can toggle to match case and use regular
expression according to your needs.
Macro library
Use the Macro library to create, edit, and manage your macros.
Creating macros
FortiAnalyzer includes a number of predefined macros. You can also create new macros, or clone and edit existing
macros.
Macros are predefined to use specific datasets and queries. They are organized into categories, and can be added to,
removed from, and organized in reports.
Dataset Select a dataset from the dropdown list. The options will vary based on device
type.
Data Binding The data bindings vary depending on the dataset selected. Select a data
binding from the dropdown list.
4. Click OK. The newly created macro is shown in the Macro library.
Managing macros
You can manage macros by Reports > Report Definitions > Macro Library. Some options are available as buttons on the
toolbar. Some options are available in the right-click menu. Right-click a macro to display the menu.
Option Description
Edit Edit the selected macro. You can edit macros that you created.
View Displays the settings for the selected macro. You cannot edit predefined macros.
Delete Deletes the selected macro. You can delete macros that you create. You cannot
delete predefined macros.
View Options Select or deselect the checkboxes to show or hide FortiGuard, Built-in, and
Custom macros in the table view.
Search Lets you search for a macro name. You can toggle to match case and use regular
expression according to your needs.
Datasets
Use the Datasets pane to create, edit, and manage your datasets.
Creating datasets
FortiAnalyzer datasets are collections of data from logs for monitored devices. Charts and macros reference datasets.
When you generate a report, the datasets populate the charts and macros to provide data for the report.
FortiAnalyzer has many predefined datasets that you can use right away. You can also create your own custom
datasets. An easy way to build a custom query is to copy and modify a predefined dataset's query.
Log Type Select a log type from the dropdown list. Below is a list of the available log
types based on device.
l FortiGate: Application Control, Intrusion Prevention, Content , Data Loss
Validate Click Validate to validate the entered SQL query. If any errors are present in
the query, the details of the error are displayed below, otherwise the message
will display OK.
Analyze Query Click Analyze Query to perform a detailed analysis on the SQL query. Analyze
Query displays the original SQL query, the transformed SQL query (if
applicable), and the SQL validation results.
This function also allows users to view the hcache query that is used when a
report using this dataset has enabled the auto-cache option for faster report
generation. For more information on hcache, see How auto-cache works on
page 302
Format Click Format to automatically format the entered SQL query, making it easier
to read, update, and detect errors.
Variables Click the Add button to add variable, expression, and description information.
If added, the expression for the variable will be used when configuring filters
for reports that use this dataset. For example, if Variable = User (user) and
Expression = coalesce(nullifna(`user`), ipstr(`srcip`)), then the expression will
be used when User (user) is selected as the Log Field in a report's filter. See
Filtering report output on page 314.
Test Click to test the SQL query before saving the dataset configuration.
Click Stop to end a test in progress.
Time Period Use the dropdown list to select a time period. When selecting Custom, enter
the start date and time, and the end date and time.
Devices Select All Devices or Specify to select specific devices to run the SQL query
against. Click the Select Device button to add multiple devices to the query.
4. Click Test.
The query results are displayed. If the query is not successful, an error message appears in the Test Result pane.
5. Click OK.
You can view the SQL query for a dataset, and test the query against specific devices or all devices.
The SQL dataset test function can be used to determine if any errors are present in the
SQL format. It should not be used to test returned values as those may be different than the
ones used in reports.
In addition to standard SQL queries, the following are some SQL functions specific to FortiAnalyzer. These are based on
standard SQL functions.
root_domain(hostname) The root domain of the FQDN. An example of using this function is:
select devid, root_domain(hostname) as website FROM $log
WHERE'user'='USER01' GROUP BY devid, hostname ORDER BY
hostname LIMIT 7
nullifna(expression) This is the inverse operation of coalesce that you can use to filter out n/a
values. This function takes an expression as an argument. The actual SQL syntax
this is base on is select nullif(nullif(expression, 'N/A'),
'n/a').
In the following example, if the user is n/a, the source IP is returned, otherwise the
username is returned.
select coalesce(nullifna('user'), nullifna('srcip')) as user_
src, coalesce(nullifna(root_domain(hostname)),'unknown')
as domain FROM $log WHERE dstport='80' GROUP BY user_src,
domain ORDER BY user_src LIMIT 7
email_domain email_domain returns the text after the @ symbol in an email address. email_
email_user user returns the text before the @ symbol in an email address. An example of
using this function is:
select 'from' as source, email_user('from') as e_user, email_
domain('from') as e_domain FROM $log LIMIT 5 OFFSET 10
from_dtime from_dtime(bigint) returns the device timestamp without time zone. from_
from_itime itime(bigint) returns FortiAnalyzer’s timestamp without time zone. An
example of using this function is:
select itime, from_itime(itime) as faz_local_time, dtime,
from_dtime(dtime) as dev_local_time FROM $log LIMIT 3
get_devtype() Returns the source device type. An example of using this function is:
select get_devtype(srcswversion, osname, devtype) as devtype_
new, coalesce(nullifna(`srcname`),nullifna(`srcmac`),
ipstr(`srcip`)) as dev_src, sum(crscore%65536) as scores
from $log where $filter and (logflag&1>0) and crscore is
not null group by devtype_new, dev_src having sum
(crscore%65536)>0 order by scores desc
This function may return null values. To replace null values with "Unknown", you
can add the following outer query:
select coalesce(nullifna(`devtype_new`), 'Unknown') as
devtype_new1,dev_src, scores
from ###(select get_devtype(srcswversion, osname, devtype) as
devtype_new, coalesce(nullifna(`srcname`),nullifna
(`srcmac`), ipstr(`srcip`)) as dev_src, sum
(crscore%65536) as scores from $log where $filter and
(logflag&1>0) and crscore is not null group by devtype_
new, dev_src having sum(crscore%65536)>0 order by scores
desc )### t
Managing datasets
You can manage datasets by going to Reports > Report Definitions > Datasets. Some options are available as buttons
on the toolbar. Some options are available in the right-click menu. Right-click a dataset to display the menu.
Option Description
Edit Edit the selected dataset. You can edit datasets that you created.
View Displays the settings for the selected dataset. You cannot edit predefined
datasets.
Delete Deletes the selected dataset. You can delete datasets that you create. You
cannot delete predefined datasets.
Clone Clones the selected dataset. You can edit cloned datasets.
Option Description
View Options Select or deselect the checkboxes to show or hide FortiGuard, Built-in, and
Custom datasets in the table view.
Search Lets you search for a dataset name. You can toggle to match case and use
regular expression according to your needs.
Some predefined FortiAnalyzer datasets make use of aliases which are labeled as t1, t2, etc. These temporary names
can only be referenced within the dataset in which they are created.
As an example, the t1 and t2 aliases are used in the threat-Top-Intrusions-By-Types dataset to define the following
tables:
l t1: Intrusion Prevention log data.
l t2: The name, CVE, and vuln_type from the IPS_mdata table.
Metadata tables
FortiAnalyzer has access to metadata tables which are used in some predefined datasets to enrich a chart's data by
complementing log fields with information from FortiGuard. This is typically accomplished through the use of the
SQL JOIN clause.
As an example, in the threat-Top-Intrusions-By-Type dataset, the ips_mdata metadata table is referenced. The ips_
mdata table is a collection of intrusion prevention related metadata from FortiGuard that is used by this dataset to add
information about vulnerability types, vulnerability names, and CVE data to intrusion prevention logs.
You can view the information contained in the metadata tables (as well as other tables) using the following custom
dataset. An asterisk can be used to select all applicable fields.
select <field> from <table name>
For example, the custom dataset below displays all fields retrieved from the IPS metadata table.
Metadata tables from FortiGuard are also available to be used in custom dataset queries. The following metadata tables
are available:
l ips_mdata
l app_mdata
l fct_mdata
l pci_dss_mdata
l td_threat_name_mdata
Output profiles
Output profiles allow you to define email addresses to which generated reports are sent and provide an option to upload
the reports to FTP, SFTP, or SCP servers. Once created, an output profile can be specified for a report.
You must configure a mail server before you can configure an output profile. See Mail Server
on page 397.
Output Format Select the format or formats for the generated report. You can choose HTML,
PDF, XML, CSV, or JSON format.
Recipients Select the email server from the dropdown list and enter to and from email
addresses. Click Add to add another entry so that you can specify multiple
recipients.
Server Type Select FTP, SFTP, or SCP from the dropdown list.
Delete file(s) after Select to delete the generated report after it has been uploaded to the selected
uploading server.
You can manage output profiles by going to Reports > Advanced Settings > Output Profile. Some options are available
as buttons on the toolbar. Some options are available in the right-click menu. Right-click an output profile to display the
menu.
Option Description
Report languages
The languages available for reports can be found in Reports > Advanced Settings > Language. In this pane, you can
export and import language files to be used in reports. If a custom language file is no longer needed, it can be deleted
from this pane.
You can specify the language when creating a report. Select the language from the Language dropdown in the Report
Settings tab. For more information, see Reports Settings tab on page 308.
This topic includes:
l Exporting and modifying a language on page 339
l Importing a language on page 340
l Deleting a language on page 340
Importing a language
After exporting and modifying a language file, you can import it to use in reports.
You can override a system language with the import, or you can import a custom language.
If the import was to override a system language, such as English, the Status column
changes from System to User defined. You can delete this row to restore the original
system language. See Deleting a language on page 340.
Deleting a language
You can delete custom languages that have been imported in Reports > Advanced Settings > Language.
You cannot delete system languages unless they have been overridden by an import. Deleting the overridden language
will restore the original system language. For example, if you imported a language file with modified text to override
English, you can delete it to restore the system English language.
To delete a language:
If you delete an overridden system language, the Status column changes from User defined to System. The original
system language is restored.
Report calendar
You can use the report calendar to view all the reports that are scheduled for the selected month. You can edit or disable
upcoming report schedules, as well as delete or download completed reports.
3. Hover the mouse cursor over a calendar entry to display the name, status, and device type of the scheduled report.
4. Click a generated report to download it.
5. Click a scheduled report to go to the Settings tab of the report.
6. Click the left or right arrow at the top of the Report Calendar pane to change the month that is displayed. Click Today
to return to the current month.
You can manage report schedules in Reports > Advanced Settings > Report Calendar.
In Report Calendar, right-click an upcoming calendar entry, and select Disable. All scheduled instances of the report are
removed from the report calendar. Completed reports remain in the report calendar.
In Report Calendar, right-click a past calendar entry, and select Delete or Download. The corresponding completed
report will be deleted or downloaded.
You can only delete or download scheduled reports that have a Finished status. You cannot
delete scheduled reports with a Pending status.
System Settings allows you to manage system options for your FortiAnalyzer device.
Additional configuration options and short-cuts are available using the right-click menu. Right-
click the mouse on different navigation panes on the GUI page to access these options.
Logging Topology
The System Settings > Advanced > Logging Topology pane shows the physical topology of devices in the Security
Fabric. Click, hold, and drag to adjust the view in the content pane, and double-click or use the scroll wheel to change the
zoom.
The visualization can be filtered to show only FortiAnalyzer devices or all devices by device count or traffic.
Hovering the cursor over a device in the visualization will show information about the device, such as the IP address and
device name. Right-click on a device and select View Related Logs to go to the Log View pane, filtered for that device.
Network
The network settings are used to configure ports for the FortiAnalyzer unit. You should also specify what port and
methods that an administrators can use to access the FortiAnalyzer unit. If required, static routes can be configured.
The default port for FortiAnalyzer units is port 1. It can be used to configure one IP address for the FortiAnalyzer unit, or
multiple ports can be configured with multiple IP addresses for improved security.
You can configure administrative access in IPv4 or IPv6 and include settings for HTTPS, HTTP, PING, SSH, SNMP,
Web Service, and FortiManager.
You can prevent unauthorized access to the GUI by creating administrator accounts with trusted hosts. With trusted
hosts configured, the administrator can only log in to the GUI when working on a computer with the trusted host as
defined in the administrator account. For more information, see Trusted hosts on page 413 and Managing administrator
accounts on page 414.
Fortinet devices can be connected to any of the FortiAnalyzer unit's interfaces. The DNS servers must be on the
networks to which the FortiAnalyzer unit connects, and should have two different IP addresses.
To configure port 1:
1. Go to System Settings > Network.The Interface pane is displayed at the top of the page.
2. In the Interface pane, double-click Port1. The Edit System Interface pane is displayed.
3. Configure the following settings for port1, then click OK to apply your changes.
Administrative Access Select the allowed administrative service protocols from: HTTPS, HTTP,
PING, SSH, SNMP, Web Service, and FortiManager.
IPv6 Administrative Access Select the allowed IPv6 administrative service protocols from: HTTPS, HTTP,
PING, SSH, SNMP, Web Service, and FortiManager.
1. Go to System Settings > Network. The Interface pane is displayed at the top of the page.
2. In the Interface pane, double-click on a port, right-click on a port then select Edit from the pop-up menu, or select a
port then click Edit in the toolbar. The Edit System Interface pane is displayed.
3. Configure the settings as required.
4. Click OK to apply your changes.
The port name, default gateway, and DNS servers cannot be changed from the Edit System
Interface pane. The port can be given an alias if needed.
Disabling ports
To disable a port:
Administrative access defines the protocols that can be used to connect to the FortiAnalyzer through an interface. The
available options are: HTTPS, HTTP, PING, SSH, SNMP, Web Service, and FortiManager.
1. Go to System Settings > Network and click All Interfaces. The interface list opens.
2. Double-click on a port, right-click on a port then select Edit from the pop-up menu, or select a port then click Edit in
the toolbar. The Edit System Interface pane is displayed.
3. Select one or more access protocols for the interface for Administrative Access and IPv6 Administrator Access, as
required.
4. Click OK to apply your changes.
Static routes
Static routes can be managed from the routing tables for IPv4 and IPv6 routes. The routing tables can be accessed by
going to System Settings > Network.
1. From the network routing table, click Create New in the toolbar. The Create New Network Route pane opens.
2. Select the IP Type as either IPv4 or IPv6.
3. Enter the destination IP address and netmask, or IPv6 prefix, and gateway in the requisite fields.
4. Select the network interface that connects to the gateway from the dropdown list. Ports, aggregate links, and VLANs
are available.
5. Click OK to create the new static route.
1. From the network routing table: double-click on a route, right-click on a route then select Edit from the pop-up menu,
or select a route then click Edit in the toolbar. The Edit Network Route pane opens.
2. Edit the configuration as required. The route ID cannot be changed.
3. Click OK to apply your changes.
1. From the newtork routing table, right-click on a route then select Delete from the pop-up menu, or select a route or
routes then click Delete in the toolbar.
2. Click OK in the confirmation dialog box to delete the selected route or routes.
Packet capture
Packets can be captured on configured interfaces by going to System > Network > Packet Capture.
The following information is available:
Interface The name of the configured interface for which packets can be captured.
For information on configuring an interface, see Configuring network interfaces on
page 344.
Maximum Packet Count The maximum number of packets that can be captured on a sniffer.
Actions Allows you to start and stop the capturing process, and download the most
recently captured packets.
To start capturing packets on an interface, select the Start capturing button in the Actions column for that interface. The
Progress column changes to Running, and the Stop capturing and Download buttons become available in the Actions
column.
1. From the Packet Capture table, click Create New in the toolbar. The Create New Sniffer pane opens.
2. Configure the following options:
Max. Packets to Save Enter the maximum number of packets to capture, between 1-10000. The
default is 4000 packets.
Include IPv6 Packets Select to include IPv6 packets when capturing packets.
Include Non-IP Packets Select to include non-IP packets when capturing packets.
Enable Filters You can filter the packet by Host(s), Port(s), VLAN(s), and Protocol.
3. Click OK.
1. In the Actions column, click the Download button for the interface whose captured packets you want to download.
If no packets have been captured for that interface, click the Start capturing button.
2. When prompted, save the packet file (sniffer_[interface].pcap) to your management computer.
The file can then be opened using packet analyzer software.
1. From the Packet Capture table, click Edit in the toolbar. The Edit Sniffer pane opens.
2. Configure the packet sniffer options
3. Click OK.
Aggregate links
Link aggregation enables you to bind two or more physical interfaces together to form an aggregated (combined) link.
This new link has the bandwidth of all the links combined. If a link in the group fails, traffic is transferred automatically to
the remaining interfaces.
10. In the Minimum Links Up field, enter the number of aggregated ports that must be up.
You must enter a minimum value of 2 for the aggregate links to work.
VLAN interfaces
You can configure a VLAN interface in FortiAnalyzer by going to System Settings > Network.
SNMP
Enable the SNMP agent on the FortiAnalyzer device so it can send traps to and receive queries from the computer that is
designated as its SNMP manager. This allows for monitoring the FortiAnalyzer with an SNMP manager.
SNMP has two parts - the SNMP agent that is sending traps, and the SNMP manager that monitors those traps. The
SNMP communities on monitored FortiGate devices are hard coded and configured by the FortiAnalyzer system - they
are not user configurable.
The FortiAnalyzer SNMP implementation is read-only — SNMP v1, v2c, and v3 compliant SNMP manager applications,
such as those on your local computer, have read-only access to FortiAnalyzer system information and can receive
FortiAnalyzer system traps.
SNMP agent
The SNMP agent sends SNMP traps originating on the FortiAnalyzer system to an external monitoring SNMP manager
defined in a SNMP community. Typically an SNMP manager is an application on a local computer that can read the
SNMP traps and generate reports or graphs from them.
The SNMP manager can monitor the FortiAnalyzer system to determine if it is operating properly, or if there are any
critical events occurring. The description, location, and contact information for this FortiAnalyzer system will be part of
the information an SNMP manager will have — this information is useful if the SNMP manager is monitoring many
devices, and it will enable faster responses when the FortiAnalyzer system requires attention.
Go to System Settings > Network and scroll to the SNMP section to configure the SNMP agent.
SNMP Agent Select to enable the SNMP agent. When this is enabled, it sends FortiAnalyzer
SNMP traps.
Description Optionally, type a description of this FortiAnalyzer system to help uniquely identify
this unit.
Location Optionally, type the location of this FortiAnalyzer system to help find it in the event
it requires attention.
Contact Optionally, type the contact information for the person in charge of this
FortiAnalyzer system.
SNMP v1/2c The list of SNMP v1/v2c communities added to the FortiAnalyzer configuration.
Create New Select Create New to add a new SNMP community. If SNMP agent is not
selected, this control will not be visible.
For more information, see SNMP v1/v2c communities on page 351.
Queries The status of SNMP queries for each SNMP community. The enabled icon
indicates that at least one query is enabled. The disabled icon indicates that all
queries are disabled.
Traps The status of SNMP traps for each SNMP community. The enabled icon indicates
that at least one trap is enabled. The disabled icon indicates that all traps are
disabled.
Create New Select Create New to add a new SNMP user. If SNMP agent is not selected, this
control will not be visible.
For more information, see SNMP v3 users on page 354.
Notification Hosts The notification host or hosts assigned to the SNMPv3 user.
Queries The status of SNMP queries for each SNMP user. The enabled icon indicates
queries are enabled. The disabled icon indicates they are disabled.
An SNMP community is a grouping of equipment for network administration purposes. You must configure your
FortiAnalyzer to belong to at least one SNMP community so that community’s SNMP managers can query the
These SNMP communities do not refer to the FortiGate devices the FortiAnalyzer system is
managing.
Each community can have a different configuration for SNMP traps and can be configured to monitor different events.
You can add the IP addresses of up to eight hosts to each community. Hosts can receive SNMP device traps and
information.
Name Enter a name to identify the SNMP community. This name cannot be edited
later.
Hosts The list of hosts that can use the settings in this SNMP community to monitor
the FortiAnalyzer system.
When you create a new SNMP community, there are no host entries. Select
Add to create a new entry that broadcasts the SNMP traps and information to
the network connected to the specified interface.
Interface Select the interface that connects to the network where this SNMP manager
is located from the dropdown list. This must be done if the SNMP manager is
on the Internet or behind a router.
Delete Click the delete icon to remove this SNMP manager entry.
Add Select to add another entry to the Hosts list. Up to eight SNMP manager
entries can be added for a single community.
Queries Enter the port number (161 by default) the FortiAnalyzer system uses to send
v1 and v2c queries to the FortiAnalyzer in this community. Enable queries for
each SNMP version that the FortiAnalyzer system uses.
Traps Enter the Remote port number (162 by default) the FortiAnalyzer system
uses to send v1 and v2c traps to the FortiAnalyzer in this community. Enable
traps for each SNMP version that the FortiAnalyzer system uses.
SNMP Event Enable the events that will cause SNMP traps to be sent to the community.
l Interface IP changed
l Log disk space low
l CPU Overuse
l Memory Low
l System Restart
l CPU usage exclude NICE threshold
l RAID Event (only available for devices that support RAID)
l Power Supply Failed (only available on supported hardware devices)
l Fan Speed Out of Range
l Temperature Out of Range
l Voltage Out of Range
l High licensed device quota
l High licensed log GB/day
l Log Alert
l Log Rate
l Data Rate
FortiAnalyzer feature set SNMP events:
SNMP v3 users
The FortiAnalyzer SNMP v3 implementation includes support for queries, traps, authentication, and privacy. SNMP v3
users can be created, edited, and deleted as required.
Security Level The security level of the user. Select one of the following:
l No Authentication, No Privacy
l Authentication, No Privacy: Select the Authentication Algorithm (MD5,
SHA, SHA224, SHA256, SHA384, SHA512) and enter the password.
l Authentication, Privacy: Select the Authentication Algorithm (MD5, SHA,
SHA224, SHA256, SHA384, SHA512), the Private Algorithm (AES,
AES256, AES256CISCO, DES), and enter the passwords.
Queries Select to enable queries then enter the port number. The default port is 161.
Notification Hosts The IP address or addresses of the host. Click the add icon to add multiple IP
addresses.
SNMP Event Enable the events that will cause SNMP traps to be sent to the SNMP
manager.
l Interface IP changed
l Log disk space low
l CPU Overuse
l Memory Low
l System Restart
l CPU usage exclude NICE threshold
l RAID Event (only available for devices that support RAID)
l Power Supply Failed (only available on supported hardware devices)
l High licensed device quota
l High licensed log GB/day
l Log Alert
l Log Rate
l Log Data Rate
l Fan Speed Out of Range
l Temperature Out of Range
l Voltage Out of Range
SNMP MIBs
The Fortinet and FortiAnalyzer MIBs, along with the two RFC MIBs, can be obtained from Customer Service & Support
(https://support.fortinet.com). You can download the FORTINET-FORTIMANAGER-FORTIANALYZER-MIB.mib MIB file
in the firmware image file folder. The FORTINET-CORE-MIB.mib file is located in the main FortiAnalyzer 5.00 file folder.
RFC support for SNMP v3 includes Architecture for SNMP Frameworks (RFC 3411), and partial support of User-based
Security Model (RFC 3414).
To be able to communicate with the SNMP agent, you must include all of these MIBs into your SNMP manager.
Generally your SNMP manager will be an application on your local computer. Your SNMP manager might already
include standard and private MIBs in a compiled database that is ready to use. You must add the Fortinet and
FortiAnalyzer proprietary MIBs to this database.
FORTINET-CORE-MIB.mib The proprietary Fortinet MIB includes all system configuration information and
trap information that is common to all Fortinet products.
Your SNMP manager requires this information to monitor Fortinet unit
configuration settings and receive traps from the Fortinet SNMP agent.
FORTINET-FORTIMANAGER- The proprietary FortiAnalyzer MIB includes system information and trap
MIB.mib information for FortiAnalyzer units.
RFC-1213 (MIB II) The Fortinet SNMP agent supports MIB II groups with the following exceptions.
l No support for the EGP group from MIB II (RFC 1213, section 3.11 and 6.10).
accurately capture all Fortinet traffic activity. More accurate information can
be obtained from the information reported by the Fortinet MIB.
RFC-2665 (Ethernet-like MIB) The Fortinet SNMP agent supports Ethernet-like MIB information with the
following exception.
No support for the dot3Tests and dot3Errors groups.
SNMP traps
Fortinet devices share SNMP traps, but each type of device also has traps specific to that device type. For example
FortiAnalyzer units have FortiAnalyzer specific SNMP traps. To receive Fortinet device SNMP traps, you must load and
compile the FORTINET-CORE-MIB into your SNMP manager.
Traps sent include the trap message as well as the unit serial number (fnSysSerial) and host name (sysName). The Trap
Message column includes the message that is included with the trap, as well as the SNMP MIB field name to help locate
the information about the trap.
High Licensed Log fmTrapLicGbDayThreshold Indicates that the used log has exceeded the licensed
GB/day GB/Day.
lic-gbday
Log Alert fmTrapLogAlert Trap is sent when a log based alert has been triggered.
log-alert Alert description included in trap.
CPU usage fmTrapCpuThresholdExcludeNice Indicates that the CPU usage excluding nice processes
exclude NICE has exceeded the threshold.
threshold This threshold can be set in the CLI using the following
cpu-high- commands:
exclude-nice config system snmp sysinfo
set trap-cpu-high-exclude-nice-
threshold <percentage value>
end
High licensed fmTrapLicDevQuotaThreshold Indicates that the used device quota has exceeded the
device quota licensed device quota.
lic-dev-quota
Log Data Rate fmTrapLogDataRateThreshold Indicates that the incoming log data rate has exceeded
log-data-rate the threshold.
The peak data rate is calculated using the peak log rate
x 512 bytes (average log size).
Log Rate fmTrapLogRateThreshold Indicates that the incoming log rate has exceeded the
log-rate threshold.
To determine the peak log rate, use the following
CLI command: get system loglimits
System Restart fmTrapPowerStateChange Trap is sent when there is a change in the status of the
sys_reboot power supply, if present.
CPU Overuse fnTrapCpuThreshold Indicates that the CPU usage has exceeded the
cpu_high configured threshold.
This threshold can be set in the CLI using the following
commands:
config system snmp sysinfo
set trap-high-cpu-threshold
<percentage value>
end
Memory Low fnTrapMemThreshold Indicates memory usage has exceeded the configured
mem_low threshold.
This threshold can be set in the CLI using the following
commands:
config system snmp sysinfo
set trap-low-memory-threshold
<percentage value>
end
Log Disk Space fnTrapLogDiskThreshold Log disk usage has exceeded the configured threshold.
Low Only available on devices with log disks.
disk_low
The Fortinet MIB contains fields reporting current Fortinet unit status information. The below tables list the names of the
MIB fields and describe the status information available for each one. You can view more details about the information
available from all Fortinet MIB fields by compiling the fortinet.3.00.mib file into your SNMP manager and browsing
the Fortinet MIB fields.
Administrator accounts:
Custom messages:
RAID Management
RAID helps to divide data storage over multiple disks, providing increased data reliability. For FortiAnalyzer devices
containing multiple hard disks, you can configure the RAID array for capacity, performance, and/or availability.
The RAID Management tree menu is only available on FortiAnalyzer devices that support
RAID.
FortiAnalyzer units with multiple hard drives can support the following RAID levels:
See the FortiAnalyzer datasheet to determine your devices supported RAID levels.
Linear RAID
A Linear RAID array combines all hard disks into one large virtual disk. The total space available in this option is the
capacity of all disks used. There is very little performance change when using this RAID format. If any of the drives fails,
the entire set of drives is unusable until the faulty drive is replaced. All data will be lost.
RAID 0
A RAID 0 array is also referred to as striping. The FortiAnalyzer unit writes information evenly across all hard disks. The
total space available is that of all the disks in the RAID array. There is no redundancy available. If any single drive fails,
the data on that drive cannot be recovered. This RAID level is beneficial because it provides better performance, since
the FortiAnalyzer unit can distribute disk writing across multiple disks.
l Minimum number of drives: 2
l Data protection: No protection
RAID 1
A RAID 1 array is also referred to as mirroring. The FortiAnalyzer unit writes information to one hard disk, and writes a
copy (a mirror image) of all information to all other hard disks. The total disk space available is that of only one hard disk,
as the others are solely used for mirroring. This provides redundant data storage with no single point of failure. Should
any of the hard disks fail, there are backup hard disks available.
l Minimum number of drives: 2
l Data protection: Single-drive failure
One write or two reads are possible per mirrored pair. RAID 1 offers redundancy of data. A re-
build is not required in the event of a drive failure. This is the simplest RAID storage design
with the highest disk overhead.
RAID 1s
A RAID 1 with hot spare array uses one of the hard disks as a hot spare (a stand-by disk for the RAID). If a hard disk fails,
within a minute of the failure the hot spare is substituted for the failed drive, integrating it into the RAID array and
rebuilding the RAID’s data. When you replace the failed hard disk, the new hard disk is used as the new hot spare. The
total disk space available is the total number of disks minus two.
RAID 5
A RAID 5 array employs striping with a parity check. Similar to RAID 0, the FortiAnalyzer unit writes information evenly
across all drives but additional parity blocks are written on the same stripes. The parity block is staggered for each stripe.
The total disk space is the total number of disks in the array, minus one disk for parity storage. For example, with four
hard disks, the total capacity available is actually the total for three hard disks. RAID 5 performance is typically better
with reading than with writing, although performance is degraded when one disk has failed or is missing. With RAID 5,
one disk can fail without the loss of data. If a drive fails, it can be replaced and the FortiAnalyzer unit will restore the data
on the new disk by using reference information from the parity volume.
l Minimum number of drives: 3
l Data protection: Single-drive failure
RAID 5s
A RAID 5 with hot spare array uses one of the hard disks as a hot spare (a stand-by disk for the RAID). If a hard disk fails,
within a minute of the failure, the hot spare is substituted for the failed drive, integrating it into the RAID array, and
rebuilding the RAID’s data. When you replace the failed hard disk, the new hard disk is used as the new hot spare. The
total disk space available is the total number of disks minus two.
RAID 6
A RAID 6 array is the same as a RAID 5 array with an additional parity block. It uses block-level striping with two parity
blocks distributed across all member disks.
l Minimum number of drives: 4
l Data protection: Up to two disk failures.
RAID 6s
A RAID 6 with hot spare array is the same as a RAID 5 with hot spare array with an additional parity block.
RAID 10
RAID 10 (or 1+0), includes nested RAID levels 1 and 0, or a stripe (RAID 0) of mirrors (RAID 1). The total disk space
available is the total number of disks in the array (a minimum of 4) divided by 2, for example:
l 2 RAID 1 arrays of two disks each,
l 3 RAID 1 arrays of two disks each,
l 6 RAID1 arrays of two disks each.
One drive from a RAID 1 array can fail without the loss of data; however, should the other drive in the RAID 1 array fail,
all data will be lost. In this situation, it is important to replace a failed drive as quickly as possible.
l Minimum number of drives: 4
l Data protection: Up to two disk failures in each sub-array.
RAID 50
RAID 50 (or 5+0) includes nested RAID levels 5 and 0, or a stripe (RAID 0) and stripe with parity (RAID 5). The total disk
space available is the total number of disks minus the number of RAID 5 sub-arrays. RAID 50 provides increased
performance and also ensures no data loss for the same reasons as RAID 5. One drive in each RAID 5 array can fail
without the loss of data.
l Minimum number of drives: 6
l Data protection: Up to one disk failure in each sub-array.
Higher fault tolerance than RAID 5 and higher efficiency than RAID 0.
RAID 50 is only available on models with 9 or more disks. By default, two groups are used
unless otherwise configured via the CLI. Use the diagnose system raid status CLI
command to view your current RAID level, status, size, groups, and hard disk drive
information.
RAID 60
A RAID 60 (6+ 0) array combines the straight, block-level striping of RAID 0 with the distributed double parity of RAID 6.
l Minimum number of drives: 8
l Data protection: Up to two disk failures in each sub-array.
High read data transaction rate, medium write data transaction rate, and slightly lower
performance than RAID 50.
To view the RAID status, go to System Settings > RAID Management. The RAID Management pane displays the RAID
level, status, and disk space usage. It also shows the status, size, and model of each disk in the RAID array.
The Alert Message Console widget, located in Dashboards > Status, provides detailed
information about RAID array failures. For more information see Alert Messages Console
widget on page 65.
Graphic Displays the position and status of each disk in the RAID array. Hover the cursor
over each disk to view details.
Disk Space Usage Displays the total size of the disk space, how much disk space is used, and how
much disk space is free.
Disk Management Shows information about each disk in the RAID array.
Disk Status Displays the status of each disk in the RAID array.
l Ready: The hard drive is functioning normally.
l Rebuilding: The FortiAnalyzer unit is writing data to a newly added hard drive
in order to restore the hard drive to an optimal state. The FortiAnalyzer unit is
not fully fault tolerant until rebuilding is complete.
l Initializing: The FortiAnalyzer unit is writing to all the hard drives in the device
l Inoperable: One or more drives are missing from the FortiAnalyzer unit. The
If a hard disk on a FortiAnalyzer unit fails, it must be replaced. On FortiAnalyzer devices that support hardware RAID, the
hard disk can be replaced while the unit is still running - known as hot swapping. On FortiAnalyzer units with software
RAID, the device must be shutdown prior to exchanging the hard disk.
To identify which hard disk failed, read the relevant log message in the Alert Message Console widget. See Alert
Messages Console widget on page 65.
Electrostatic discharge (ESD) can damage FortiAnalyzer equipment. Only perform the
procedures described in this document from an ESD workstation. If no such station is
available, you can provide some ESD protection by wearing an anti-static wrist or ankle strap
and attaching it to an ESD connector or to a metal part of a FortiAnalyzer chassis.
When replacing a hard disk, you need to first verify that the new disk is the same size as those
supplied by Fortinet and has at least the same capacity as the old one in the FortiAnalyzer unit.
Installing a smaller hard disk will affect the RAID setup and may cause data loss. Due to
possible differences in sector layout between disks, the only way to guarantee that two disks
have the same size is to use the same brand and model.
The size provided by the hard drive manufacturer for a given disk model is only an
approximation. The exact size is determined by the number of sectors present on the disk.
Some FortiAnalyzer units have space to add more hard disks to increase your storage capacity.
Fortinet recommends you use the same disks as those supplied by Fortinet. Disks of other
brands will not be supported by Fortinet. For information on purchasing extra hard disks,
contact your Fortinet reseller.
Administrative domains (ADOMs) enable administrators to manage only those devices that they are specifically
assigned, based on the ADOMs to which they have access. When the ADOM mode is advanced, FortiGate devices with
multiple VDOMs can be divided among multiple ADOMs.
Administrator accounts can be tied to one or more ADOMs, or denied access to specific ADOMs. When a particular
administrator logs in, they see only those devices or VDOMs that have been enabled for their account. Super user
administrator accounts, such as the admin account, can see and maintain all ADOMs and the devices within them.
Each ADOM specifies how long to store and how much disk space to use for its logs. You can monitor disk utilization for
each ADOM and adjust storage settings for logs as needed.
The maximum number of ADOMs you can add depends on the FortiAnalyzer system model. Please refer to the
FortiAnalyzer data sheet for more information.
When the maximum number of ADOMs has been reached, you will be unable to create a new ADOM.
When upgrading to FortiAnalyzer 6.2.1 or later, you will continue to have access to any ADOMs exceeding the limit,
however, no additional ADOMs can be created, and an alert will be issued in the Alert Message Console in Dashboards
> Status.
By default, ADOMs are disabled. Enabling and configuring ADOMs can only be done by administrators with the Super_
User profile. See Administrators on page 413.
The root ADOM and Security Fabric ADOMs are available for visibility into all Fabric devices. See Security Fabric
ADOMs on page 176.
Non-FortiGate devices are automatically located in specific ADOMs for their device type. They
cannot be moved to other ADOMs, except for FortiClient devices, which can be promoted to
Fabric ADOMs if needed.
ADOMs must be enabled to support the logging and reporting of non-FortiGate devices.
Root ADOM
When ADOMs are enabled, the default root ADOM type is Fabric. Fabric ADOMs show combined results from all
Security Fabric devices in the Device Manager, Log View, FortiView, Incidents & Events and Reports panes. For more
information on Fabric ADOMs, see Security Fabric ADOMs on page 176.
In FortiAnalyzer 6.2.0 and earlier, the root ADOM is a FortiGate ADOM. When upgrading to FortiAnalyzer 6.2.1 and later,
the root ADOM type will not be changed to Fabric. Resetting the FortiAnalyzer settings through a factory reset will cause
the root ADOM to become a Fabric ADOM.
When ADOMs are enabled, FortiAnalyzer includes default ADOMs for specific types of devices. When you add one or
more of these devices to FortiAnalyzer, the devices are automatically added to the appropriate ADOM, and the ADOM
becomes selectable. When a default ADOM contains no devices, the ADOM is not selectable.
For example, when you add a FortiClient EMS device to the FortiAnalyzer, the FortiClient EMS device is automatically
added to the default FortiClient ADOM. After the FortiClient ADOM contains a FortiClient EMS device, the FortiClient
ADOM is selectable when you log into FortiAnalyzer or when you switch between ADOMs.
You can view all of the ADOMs, including default ADOMs without devices, on the System Settings > ADOMs pane.
You can organize devices into ADOMs to allow you to better manage these devices. Devices can be organized by
whatever method you deem appropriate, for example:
l Firmware version: group all devices with the same firmware version into an ADOM.
l Geographic regions: group all devices for a specific geographic region into an ADOM, and devices for a different
region into another ADOM.
l Administrative users: group devices into separate ADOMs based for specific administrators responsible for the
group of devices.
l Customers: group all devices for one customer into an ADOM, and devices for another customer into another
ADOM.
FortiClient logs are stored in the device that the FortiClient endpoint is registered to.
For example, when endpoints are registered to a FortiGate device, FortiClient logs are viewed on the FortiGate device.
When endpoints are registered to a FortiClient EMS, FortiClient logs are viewed in the FortiClient ADOM that the
FortiClient EMS device is added to.
ADOMs must be enabled to support FortiClient EMS devices.
1. Add https-logging to the allowaccess list using the following CLI command:
config system interface
edit "port1"
With FortiClient EMS multitenancy, you can create multiple sites to provide granular access to different sites and to
separate endpoint data and configurations.
On FortiAnalyzer, the FortiClient EMS device can be authorized to Fabric or FortiClient ADOM, as needed. When sites
are configured as part of multitenancy, they will be nested under the device in Device Manager on FortiAnalyzer. For
example, see below.
In Log View > FortiClient, multitenancy logs can be identified using the following two columns:
l Registered to Device = the FortiClient device
l Virtual Domain = the site name
When the ADOM Mode is set to Advanced, the sites can be assigned to different ADOMs, as needed. For example, see
below. The lab site (VDOM) is assigned to the Lab ADOM in FortiAnalyzer. To set ADOM Mode to advanced, see ADOM
device modes on page 369.
By default, ADOMs are disabled. Enabling and configuring ADOMs can only be done by super user administrators.
When ADOMs are enabled, the Device Manager, FortiView, Log View, Incidents & Events, and Reports panes are
displayed per ADOM. You select the ADOM you need to work in when you log into the FortiAnalyzer unit. See Switching
between ADOMs on page 31.
ADOMs must be enabled to support FortiMail and FortiWeb logging and reporting. When a
FortiMail or FortiWeb device is authorized, the device is added to the respective default ADOM
and is visible in the left-hand tree menu.
FortiGate and FortiCarrier devices cannot be grouped into the same ADOM. FortiCarrier
devices are added to a specific default FortiCarrier ADOM.
1. Remove all the devices from all non-root ADOMs. That is, add all devices to the root ADOM.
2. Delete all non-root ADOMs. See Deleting ADOMs on page 374.
Only after removing all the non-root ADOMs can ADOMs be disabled.
3. Go to Dashboard.
4. In the System Information widget, toggle the Administrative Domain switch to OFF.
You will be automatically logged out of the FortiAnalyzer and returned to the log in screen.
The ADOMs feature cannot be disabled if ADOMs are still configured and have managed
devices in them.
ADOM deployment can have two device modes: Normal (default) and Advanced.
l In Normal mode, you cannot assign different FortiGate VDOMs to different ADOMs. The FortiGate unit can only be
added to a single ADOM.
l In Advanced mode, you can assign a VDOM from a single device to a different ADOM. This allows you to analyze
data for individual VDOMs, but will result in more complicated management scenarios. It is recommended only for
advanced users.
FortiAnalyzer does not support splitting FortiGate VDOMs between multiple ADOMs in
different ADOM modes (normal/backup).
To change from Advanced mode back to Normal mode, you must ensure no FortiGate VDOMs are assigned to an
ADOM.
Managing ADOMs
The ADOMs feature must be enabled before ADOMs can be created or configured. See Enabling and disabling the
ADOM feature on page 368.
To create and manage ADOMs, go to System Settings > ADOMs.
Create New Create a new ADOM. See Creating ADOMs on page 370.
Edit Edit the selected ADOM. This option is also available from the right-click menu.
See Editing an ADOM on page 373.
Delete Delete the selected ADOM or ADOMs. You cannot delete default ADOMs. This
option is also available from the right-click menu. See Deleting ADOMs on page
374.
Enter ADOM Switch to the selected ADOM. This option is also available from the right-click
menu.
Disable ADOM Disable the selected ADOM. This option is also available from the right-click
menu.
More Select Expand Devices to expand all of the ADOMs to show the devices in each
ADOM.
Select Collapse Devices to collapses the device lists.
Select an ADOM, and click Clone to make a copy of the ADOM. Devices are not
cloned to the new ADOM.
Some of these options are also available from the right-click menu.
Firmware Version The firmware version of the ADOM. Devices in the ADOM should have the same
firmware version.
Devices The number of devices and VDOMs that the ADOM contains.
The device list can be expanded or by clicking the triangle.
Creating ADOMs
ADOMs must be enabled, and you must be logged in as a super user administrator to create a new ADOM.
Consider the following when creating ADOMs:
l The maximum number of ADOMs that can be created depends on the FortiAnalyzer model. For more information,
see the FortiAnalyzer data sheet at https://www.fortinet.com/products/management/fortianalyzer.html.
When the maximum number of ADOMs has been exceeded, an alert will be issued in the Alert Message Console in
Dashboards > Status.
l You must use an administrator account that is assigned the Super_User administrative profile.
l You can add a device to only one ADOM. You cannot add a device to multiple ADOMs.
l You cannot add FortiGate and FortiCarrier devices to the same ADOM. FortiCarrier devices are added to a specific,
default FortiCarrier ADOM.
l You can add one or more VDOMs from a FortiGate device to one ADOM. If you want to add individual VDOMs from
a FortiGate device to different ADOMs, you must first enable advanced device mode. See ADOM device modes on
page 369.
l You can configure how an ADOM handles log files from its devices. For example, you can configure how much disk
space an ADOM can use for logs, and then monitor how much of the allotted disk space is used. You can also
specify how long to keep logs in the SQL database and how long to keep logs stored in compressed format.
To create an ADOM:
1. Ensure that ADOMs are enabled. See Enabling and disabling the ADOM feature on page 368.
2. Go to System Settings > ADOMs.
3. Click Create New in the toolbar. The Create New ADOM pane is displayed.
Name Type a name that allows you to distinguish this ADOM from your other
ADOMs. ADOM names must be unique.
Type Select the type of device that you are creating an ADOM for. The ADOM type
cannot be edited.
For Security Fabric ADOMs, select Fabric.
Although you can create a different ADOM for each type of device,
FortiAnalyzer does not enforce this setting.
Time Zone Select the time zone for the ADOM.
This time zone will be used when displaying data in Log View and FortiView.
The Default time zone is the time zone set for the FortiAnalyzer. For more
information, see Configuring the system time on page 48.
DNS Select Use System DNS or specify a unique DNS server for the ADOM.
When a unique DNS server is specified for the ADOM, all the resolution of IP
address to hostnames in the ADOM are queried to the specified DNS server
instead of the system DNS server in Log View, FortiView, Reports, and so on.
To assign devices to an ADOM you must be logged in as a super user administrator. Devices cannot be assigned to
multiple ADOMs.
4. Select the devices that you want to add to the ADOM. Only devices with the same version as the ADOM can be
added. The selected devices are displayed in the Devices list.
If the ADOM mode is Advanced you can add separate VDOMs to the ADOM as well as units.
5. When done selecting devices, click Close to close the Select Device list.
6. Click OK.
The selected devices are removed from their previous ADOM and added to this one.
Super user administrators can create other administrators and either assign ADOMs to their account or exclude them
from specific ADOMs, constraining them to configurations and data that apply only to devices in the ADOMs they can
access.
By default, when ADOMs are enabled, existing administrator accounts other than admin are
assigned to the root domain, which contains all devices in the device list. For more information
about creating other ADOMs, see Creating ADOMs on page 370.
1. Log in as a super user administrator. Other types of administrators cannot configure administrator accounts when
ADOMs are enabled.
2. Go to System Settings > Administrators.
3. Double-click on an administrator, right-click on an administrator and then select the Edit from the menu, or select the
administrator then click Edit in the toolbar. The Edit Administrator pane opens.
4. Edit the Administrative Domain field as required, either assigning or excluding specific ADOMs.
5. Select OK to apply your changes.
Editing an ADOM
To edit an ADOM you must be logged in as a super user administrator. The ADOM type and version cannot be edited.
For the default ADOMs, the name cannot be edited.
To edit an ADOM:
Deleting ADOMs
To delete an ADOM, you must be logged in as a super-user administrator (see Administrator profiles on page 423), such
as the admin administrator.
Prior to deleting an ADOM:
l All devices must be removed from the ADOM. Devices can be moved to another ADOM, or to the root ADOM. See
Assigning devices to an ADOM on page 372.
To delete an ADOM:
Fabric Management
In System Settings > Fabric Management, you can create and manage a FortiAnalyzer Fabric, a fabric connection to
FortiManager, and storage connectors.
Use the FortiAnalyzer Fabric tab to create or join a FortiAnalyzer Fabric. For more information, see the FortiAnalyzer
Fabric Deployment Guide.
Use the Fabric Connectors tab to establish a fabric connection to FortiManager and create storage connectors. For
more information about the FortiManager fabric connector, see the FortiManager Administration Guide.
Storage connectors
You can use the Fabric Connectors tab to create the following types of storage connectors:
l Amazon S3
l Azure Blob Container
l Google Cloud Storage
You can create storage connectors for Amazon S3, Azure Blob, and Google Cloud. Once you have created a storage
connector, you can upload FortiAnalyzer logs to cloud storage. You must also import the CA certificate from the cloud
service provider. See Upload logs to cloud storage on page 405
Property Description
Status Toggle On to enable the fabric connector. Toggle Off to disable the
fabric connector.
Access Key ID Paste the access key from the IAM user account.
Secret Access Key Paste the secret access key from the IAM user account. Click the eye
icon to Show or Hide the key.
Azure Blob Storage Account Paste the storage account name from the Microsoft Azure account.
Name
Account Key Paste the account key from the Microsoft Azure account.
Google Cloud Paste the project number from the Google account.
Project Number
Service Account Paste the entire Google account JSON key into the field. Click the eye
Credentials icon to Show or Hide the key.
Cloud Location Select a Google Cloud location. For information about Google locations,
visit the product help.
4. Advanced options will differ between the various types of storage connectors.
Certificates
The FortiAnalyzer generates a certificate request based on the information you entered to identify the FortiAnalyzer unit.
After you generate a certificate request, you can download the request to a management computer and then forward the
request to a CA.
Local certificates are issued for a specific server, or website. Generally they are very specific, and often for an internal
enterprise network.
CA root certificates are similar to local certificates, however they apply to a broader range of addresses or to an entire
company.
The CRL is a list of certificates that have been revoked and are no longer usable. This list includes expired, stolen, or
otherwise compromised certificates. If your certificate is on this list, it will not be accepted. CRLs are maintained by the
CA that issues the certificates and include the date and time when the next CRL will be issued, as well as a sequence
number to help ensure you have the most current versions.
Local certificates
The FortiAnalyzer unit generates a certificate request based on the information you enter to identify the FortiAnalyzer
unit. After you generate a certificate request, you can download the request to a computer that has management access
to the FortiAnalyzer unit and then forward the request to a CA.
The certificate window also enables you to export certificates for authentication, importing, and viewing.
The FortiAnalyzer has one default local certificate: Fortinet_Local.
You can manage local certificates from the System Settings > Certificates page. Some options are available in the
toolbar and some are also available in the right-click menu.
In order to safeguard against compromise, in FortiAnalyzer 7.6.0, FAZ-VM license files contain
a unique certificate which is tied to the device's serial number.
Optional Information
Organization Unit The name of the department. You can enter a series of OUs up to a maximum
(OU) of 5. To add or remove an OU, use the plus (+) or minus (-) icons.
Locality (L) Name of the city or town where the device is installed.
State/Province Name of the state or province where the FortiGate unit is installed.
(ST)
Country (C) Select the country where the unit is installed from the dropdown list.
Subject Optionally, enter one or more alternative names for which the certificate is also
Alternative Name valid. Separate names with a comma.
A name can be:
l e-mail address
l IP address
l URI
l DNS name (alternatives to the Common Name)
l directory name (alternatives to the Distinguished Name)
You must precede the name with the name type. Examples:
l IP:1.1.1.1
l email:[email protected]
l email:[email protected]
l URI:http://my.url.here/
Key Size Select the key size from the dropdown list: 512 Bit, 1024 Bit, 1536 Bit, or 2048
Bit. This option is only available when the key type is RSA.
Curve Name Select the curve name from the dropdown list: secp256r1 (default),
secp384r1, or secp521r1. This option is only available when the key type is
Elliptic Curve.
Type Select the certificate type from the dropdown list: Local Certificate, PKCS #12
Certificate, or Certificate.
Certificate File Click Browse... and locate the certificate file on the management computer, or
drag and drop the file onto the dialog box.
Key File Click Browse... and locate the key file on the management computer, or drag
and drop the file onto the dialog box.
This option is only available when Type is Certificate.
When an object is added to a policy package and assigned to an ADOM, the object is available
in all devices that are part of the ADOM. If the object is renamed on a device locally,
FortiManager automatically syncs the renamed object to the ADOM.
CA certificates
The FortiAnalyzer has one default CA certificate, Fortinet_CA. In this sub-menu you can delete, import, view, and
download certificates.
Importing CA certificates
To import a CA certificate:
Downloading CA certificates
To download a CA certificate:
Deleting CA certificates
When you apply for a signed personal or group certificate to install on remote clients, you can obtain the corresponding
root certificate and Certificate Revocation List (CRL) from the issuing CA.
The CRL is a list of certificates that have been revoked and are no longer usable. This list includes expired, stolen, or
otherwise compromised certificates. If your certificate is on this list, it will not be accepted. CRLs are maintained by the
CA that issues the certificates and includes the date and time when the next CRL will be issued as well as a sequence
number to help ensure you have the most current version of the CRL.
When you receive the signed personal or group certificate, install the signed certificate on the remote client(s) according
to the browser documentation. Install the corresponding root certificate (and CRL) from the issuing CA on the
FortiAnalyzer unit according to the procedures given below.
Importing a CRL
To import a CRL:
Viewing a CRL
To view a CRL:
Deleting a CRL
Log Forwarding
You can forward logs from a FortiAnalyzer unit to another FortiAnalyzer unit, a syslog server, or a Common Event
Format (CEF) server when you use the default forwarding mode in log forwarding. You can also forward logs via an
output plugin, connecting to a public cloud service.
The client is the FortiAnalyzer unit that forwards logs to another device. The server is the FortiAnalyzer unit, syslog
server, or CEF server that receives the logs.
In addition to forwarding logs to another unit or server, the client retains a local copy of the logs. The local copy of the
logs is subject to the data policy settings for archived logs. See Log storage on page 40 for more information.
To see a graphical view of the log forwarding configuration, and to see details of the devices
involved, go to System Settings > Logging Topology. For more information, see Logging
Topology on page 343.
Modes
FortiAnalyzer supports two log forwarding modes: forwarding (default), and aggregation.
Forwarding
Logs are forwarded in real-time or near real-time as they are received. Forwarded content files include: DLP files,
antivirus quarantine files, and IPS packet captures.
This mode can be configured in both the GUI and CLI.
Aggregation
As FortiAnalyzer receives logs from devices, it stores them, and then forwards the collected logs at a specified time
every day. To avoid duplication, the client only sends logs that are not already on the server.
FortiAnalyzer supports log forwarding in aggregation mode only between two FortiAnalyzer units. Syslog and CEF
servers are not supported.
The client must provide super user log in credentials to get authenticated by the server to
aggregate logs.
Aggregation mode can only be configured with the log-forward and log-forward-service CLI commands. See
the FortiAnalyzer CLI Reference for more information.
The following table lists the differences between the two modes:
Secure channel support Yes (SSL as reliable connection) Yes (rsync + SSH)
Network bandwidth Normal (as log traffic received) Peak hour as aggregation starts to
finish
Impact on remote Normal (as log volume received) Potentially large table
FortiAnalyzer (If there is a mix of incoming real-time
and real-time logs.)
Forwarding mode only requires configuration on the client side. No configuration is needed on the server side. In
aggregation mode, accepting the logs must be enabled on the FortiAnalyzer that is acting as the server.
Forwarding mode
Forwarding mode can be configured in the GUI. No configuration is required on the server side.
3. Fill in the information as per the below table, then click OK to create the new log forwarding. The FortiAnalyzer
device will start forwarding logs to the server.
Status Set to On to enable log forwarding. Set to Off to disable log forwarding.
Remote Server Type Select the type of remote server to which you are forwarding logs:
l FortiAnalyzer
Output Profile Select the output profile. You must configure output profiles to appear in the
dropdown. For more information, see Output profiles on page 385.
This option is only available when the server type is Forward via Output
Plugin.
Server FQDN/IP Enter the fully qualified domain name or IP for the remote server.
This option is not available when the server type is Forward via Output Plugin.
Compression Turn on to enable log message compression when the remote FortiAnalyzer
also supports this format. If the remote FortiAnalyzer does not support
compression, log messages will remain uncompressed.
This option is only available when the server type is FortiAnalyzer.
Reliable Connection Turn on to use TCP connection. Turn off to use UDP connection.
If you want to forward logs to a Syslog or CEF server, ensure this option is
supported. RELP is not supported.
If the connection goes down, logs are buffered and automatically forwarded
when the connection is restored. The buffer limit is 12GB.
This option is not available when the server type is Forward via Output Plugin.
Sending Frequency Select when logs will be sent to the server: Real-time, Every 1 Minute, or
Every 5 Minutes (default).
This option is only available when the server type is FortiAnalyzer.
Device Filters Click Select Device, then select the devices whose logs will be forwarded.
Log Filters Turn on to configure filter on the logs that are forwarded.
Select All or Any of the Following Conditions in the Log messages that match
field to control how the filters are applied to the logs.
Add filters to the table by selecting the Log Field, Match Criteria, and Value for
each filter.
Enable Exclusions Turn on to configure filter on the logs that are forwarded.
Add exclusions to the table by selecting the Device Type and Log Type. Then,
add Log Fields to the Exclusion List by clicking Fields and specifying the
excluded log fields in the Select Log Field pane.
When configuring Log Forwarding Filters, FortiAnalyzer does not support wildcard or subnet
values for IP log field filters when using the Equal to and Not equal to operators.
If wildcards or subnets are required, use Contain or Not contain operators with the regex filter.
For example, the following text filter excludes logs forwarded from the 172.10.0.0/16 subnet:
srcip !~ "172\.10\.[0-9]+\.[0-9]+
Devices whose logs are being forwarded to another FortiAnalyzer device are added to the
server as unauthorized devices. To authorize devices, see Authorizing devices on page 78.
Aggregation mode
Aggregation mode can only be configured using the CLI. Aggregation mode configurations are not listed in the GUI table,
but still use a log forwarding ID number.
Use the following CLI command to see what log forwarding IDs have been used:
get system log-forward
1. If required, create a new administrator with the Super_User profile. See Creating administrators on page 415.
2. Enable log aggregation and, if necessary, configure the disk quota, with the following CLI commands:
config system log-forward-service
set accept-aggregation enable
set aggregation-disk-quota <quota>
end
Output profiles
You can use output profiles to configure log forwarding to public cloud services.
You can create and manage these output profiles in System Settings > Advanced > Log Forwarding > Output Profile.
Once created, you can use the output profile when configuring a client for log forwarding. See Configuring log forwarding
on page 382.
1. Go to System Settings > Advanced > Log Forwarding > Output Profile.
2. Click Create New.
The Create Output Profile pane displays.
Type Select the public cloud service for the output profile.
Configuration Click Use Default to use the default Fluentd configuration for the selected
public cloud service.
Alternatively, copy and paste the Fluentd configuration into this field for the
selected public cloud service.
Field Fields will automatically be added into the configuration if a keyword matches
the placeholder in the configuration to provide encryption for you to hide the
credentials.
For example, a password placeholder in the configuration would be
"${password}". In the field, you can define Field: password, Value:
actual_password.
1. Go to System Settings > Advanced > Log Forwarding > Output Profile.
2. Select the checkbox for the output profile.
3. Click Edit.
4. Edit the options as needed.
5. Click Validate and Save.
1. Go to System Settings > Advanced > Log Forwarding > Output Profile.
2. Select the checkbox for the output profile.
3. Click Clone.
4. Edit the options to create the new output profile.
5. Click Validate and Save.
1. In the FortiAnalyzer that you are exporting the output profile from, go to System Settings > Advanced > Log
Forwarding > Output Profile.
2. Select the checkbox for the output profile.
3. Click More > Export.
4. Select the export data type and click OK.
5. In the FortiAnalyzer that you are imorting the output profile to, go to System Settings > Advanced > Log Forwarding
> Output Profile.
6. Click More > Import.
7. Drag and drop or select the output profile file saved on the management computer.
If there is a conflict with an existing output profile, you can select if the import file should be skipped, renamed, or if it
should replace the existing output profile.
8. Click OK to complete the import.
You can enable and troubleshoot Fluentd logging from the FortiAnalyzer CLI using the
following commands:
diagnose sql fluentd log-tail
diagnose sql fluentd log-view
diagnose test application fwdplugind
For more information, see the FortiAnalyzer CLI Reference on the Fortinet Documents Library.
Log forwarding mode server entries can be edited and deleted using both the GUI and the CLI. Aggregation mode server
entries can only be managed using the CLI. Entries cannot be enabled or disabled using the CLI.
When log forwarding is configured, FortiAnalyzer reserves space on the system disk as a buffer between the fortilogd
and logfwd daemons. In the event of a connection failure between the log forwarding client and server (network jams,
dropped connections, etc.), logs are cached as long as space remains available. When storage space is exceeded, older
logs are deleted in favor of new logs.
The default log forward buffer size is 30% of the system reserved disk size, and can be increased to use up to 80% of the
available reserved disk. Additional storage space is available by using the disk space reserved for ADOMs. When
configuring the log forward buffer size above 80% of the reserved disk size, the space available for ADOMs is reduced.
For example, in a scenario where the FortiAnalyzer has a total disk size of 275 GB for the entire system, with a system
reserved disk size of 50 GB and an ADOM disk space of 50 GB, the log forwarding buffer can be configured up to a
maximum of 90 GB (80% of the 50 GB reserved disk size = 40 GB + 50 GB disk reserved for ADOMs = 90 GB total).
The size of the system reserved disk varies by platform and total available storage. See Disk space allocation on page
152.
The log forward buffer is shared between fortilogd for all logfwd servers.
When changes are made to the log forward cache size, each server individually resets the log
reading position to the latest one, and all logs currently in the log-forward disk cache are
dropped.
l When entering a number that uses storage from both the reserved disk size and available ADOM disk, a
message displays to indicate that the cache will be allocated from the available disk quota and reserved space.
(global)# set log-forward-cache-size 50
Log-forward disk cache will be allocated from available disk quota and reserved
space.
All logs currently in log-forward disk cache will be dropped.
Do you want to continue? (y/n)
The diagnose test application logfwd 3 CLI command can be used to display log
positions for the last log buffered and last log sent, as well as determine the buffer lag-behind.
See the FortiAnalyzer CLI Reference.
Log Fetching
Log fetching is used to retrieve archived logs from one FortiAnalyzer device to another. This allows administrators to run
queries and reports against historic data, which can be useful for forensic analysis.
The fetching FortiAnalyzer can query the server FortiAnalyzer and retrieve the log data for a specified device and time
period, based on specified filters. The retrieved data are then indexed, and can be used for data analysis and reports.
Log fetching can only be done on two FortiAnalyzer devices running the same firmware. A FortiAnalyzer device can be
either the fetch server or the fetching client, and it can perform both roles at the same time with different FortiAnalyzer
devices. Only one log fetching session can be established at a time between two FortiAnalyzer devices.
The basic steps for fetching logs are:
1. On the client, create a fetching profile. See Fetching profiles on page 389.
2. On the client, send the fetch request to the server. See Fetch requests on page 390.
3. If this is the first time fetching logs with the selected profile, or if any changes have been made to the devices and/or
ADOMs since the last fetch, on the client, sync devices and ADOMs with the server. See Synchronizing devices and
ADOMs on page 392.
4. On the server, review the request, then either approve or reject it. See Request processing on page 392.
5. Monitor the fetch process on either FortiAnalyzer. See Fetch monitoring on page 393.
6. On the client, wait until the database is rebuilt before using the fetched data for analysis.
Fetching profiles
Fetching profiles can be managed from the Profiles tab on the System Settings > Advanced > Log Fetch pane.
Profiles can be created, edited, and deleted as required. The profile list shows the name of the profile, as well as the IP
address of the server it fetches from, the server and local ADOMs, and the administrator name on the fetch server.
User Enter the username of an administrator on the fetch server, which, together
with the password, authenticates the fetch client's access to the fetch server.
Password Enter the administrator's password, which, together with the username,
authenticates the fetch client's access to the fetch server.
The fetch server administrator user name and password must be for an administrator with
either a Standard_User or Super_User profile.
Fetch requests
A fetch request requests archived logs from the fetch server configured in the selected fetch profile. When making the
request, the ADOM on the fetch server the logs are fetched from must be specified. An ADOM on the fetching client must
be specified or, if needed, a new one can be created. If logs are being fetched to an existing local ADOM, you must
ensure the ADOM has enough disk space for the incoming logs.
The data policy for the local ADOM on the client must also support fetching logs from the specified time period. It must
keep both archive and analytics logs long enough so they will not be deleted in accordance with the policy. For example:
Today is July 1, the ADOM's data policy is configured to keep analytics logs for 30 days (June 1 - 30), and you need to
fetch logs from the first week of May. The data policy of the ADOM must be adjusted to keep analytics and archive logs
for at least 62 days to cover the entire time span. Otherwise, the fetched logs will be automatically deleted after they are
fetched.
1. On the fetch client, go to System Settings > Advanced > Log Fetch > Profiles.
2. Select the profile then click Request Fetch in the toolbar, or right-click and select Request Fetch from the menu. The
Fetch Logs dialog box opens.
Name Displays the name of the fetch server you have specified.
User Displays the username of the server administrator you have provided.
Secure Connection Select to use SSL connection to transfer fetched logs from the server.
Server ADOM Select the ADOM on the server the logs will be fetched from. Only one ADOM
can be fetched from at a time.
Local ADOM Select the ADOM on the client where the logs will be received.
Either select an existing ADOM from the dropdown list, or create a new ADOM
by entering a name for it into the field.
Devices Add the devices and/or VDOMs that the logs will be fetched from. Up to 256
devices can be added.
Click Select Device, select devices from the list, then click OK.
Enable Filters Select to enable filters on the logs that will be fetched.
Select All or Any of the Following Conditions in the Log messages that match
field to control how the filters are applied to the logs.
Add filters to the table by selecting the Log Field, Match Criteria, and Value for
each filter.
Time Period Specify what date and time range of log messages to fetch.
Index Fetch Logs If selected, the fetched logs will be indexed in the SQL database of the client
once they are received. Select this option unless you want to manually index
the fetched logs.
If this is the first time the fetching client is fetching logs from the device, or if any changes have been made the devices or
ADOMs since the last fetch, then the devices and ADOMs must be synchronized with the server.
1. On the client, go to System Settings > Advanced > Log Fetch > Profiles.
2. Select the profile then click Sync Devices in the toolbar, or right-click and select Sync Devices from the menu. The
Sync Server ADOM(s) & Device(s) dialog box opens and shows the progress of the process.
Once the synchronization is complete, you can verify the changes on the client. For example, newly added devices
in the ADOM specified by the profile.
If a new ADOM is created, the new ADOM will mirror the disk space and data policy of the
corresponding server ADOM. If there is not enough space on the client, the client will create an
ADOM with the maximum allowed disk space and give a warning message. You can then
adjust disk space allocation as required.
Request processing
After a fetching client has made a fetch request, the request will be listed on the fetch server in the Received Request
section on the System Settings > Advanced > Log Fetch > Sessions pane. It will also be available from the notification
center in the GUI banner.
Fetch requests can be approved or rejected.
1. Go to the notification center in the GUI banner and click the log fetcher request, or go to System Settings >
Advanced > Log Fetch > Sessions.
2. Find the request in the Received Request section. You may have to expand the section, or select Expand All in the
content pane toolbar. The status of the request will be Waiting for approval.
3. Click Review to review the request. The Review Request dialog box will open.
4. Click Approve to approve the request, or click Reject to reject the request.
If you approve the request, the server will start to retrieve the requested logs in the background and send them to
the client. If you reject the request, the request will be canceled and the request status will be listed as Rejected on
both the client and the server.
Fetch monitoring
The progress of an approved fetch request can be monitored on both the fetching client and the fetch server.
Go to System Settings > Advanced > Log Fetch > Sessions to monitor the fetch progress. A fetch session can be paused
by clicking Pause, and resumed by clicking Resume. It can also be canceled by clicking Cancel.
Once the log fetching is completed, the status changes to Done and the request record can be deleted by clicking
Delete. The client will start to index the logs into the database.
It can take a long time for the client to finish indexing the fetched logs and make the analyzed
data available. A progress bar is shown in the GUI banner; for more information, click on it to
open the Rebuild Log Database dialog box.
Log and report features will not be fully available until the rebuilding process is complete.
You may need to rebuild the ADOM after the transfer is complete depending on the Log Fetch settings.
Is Index Fetched Yes The ADOM is rebuilt automatically and the log fetch workflow is complete.
Logs enabled in the
Log Fetch settings? No You will need to rebuild ADOM manually from the CLI.
Event Log
The Event Log pane provides an audit log of actions made by users on FortiAnalyzer. It allows you to view log messages
that are stored in memory or on the internal hard disk drive. You can use filters to search the messages and download
the messages to the management computer.
See the FortiAnalyzer Log Message Reference, available from the Fortinet Document Library, for more information
about the log messages.
The event log includes logs for modify, request, and response API calls.
You can disable or enable JSON API request and response logging in the FortiAnalyzer CLI:
config system global
set jsonapi-log {all | disable | request | response}
all - logging for both jsonapi request & response.
disable - disable jsonapi logging for both request & response.
request - logging for jsonapi request only.
response - logging for jsonapi response only.
Go to System Settings > Event Log to view the local log list.
Last... Select the amount of time to show from the available options, or select a custom
time span or any time.
Add Filter Filter the event log list based on the log level, user, sub type, or message. See
Event log filtering on page 395.
Column Settings Select which columns are enabled or disabled in the Event Log table.
Tools
Display Raw / Click on Display Raw to view the logs in their raw state.
Formatted Log Click Formatted Log to view logs formatted into a table.
Download Download the event logs in either CSV or the normal format to the management
computer.
Pagination Browse the pages of logs and adjust the number of logs that are shown per page.
Date/Time The date and time that the log file was generated.
Level The severity level of the message. For a description of severity levels, see the Log
Message Reference.
Sub Type The event log subtype. For a description of the subtypes for event logs, see the
Log Message Reference.
Performed On Entity affected by the change or operation. For example, when you log out of the
FortiAnalyzer GUI, the operation is performed on the local FortiAnalyzer GUI.
Message Log message details. A Session ID is added to each log message. The username
of the administrator is added to log messages wherever applicable for better
traceability.
The event log can be filtered using the Add Filter box in the toolbar.
l Text Mode: Click the Switch to Text Mode icon at the right end of the Add Filter box to switch to text mode. In
Task Monitor
Use the task monitor to view the status of the tasks you have performed.
Go to System Settings > Advanced > Task Monitor to view the task monitor. The task list size can also be configured;
see Miscellaneous Settings on page 407.
To filter the information in the monitor, enter a text string in the search field.
Group Error Devices Create a group of the failed devices, allowing for re-installations to be done only
on the failed devices.
View Task Detail View the task Index, Name, Status, Time Used, and History, in a new window.
Click the icons in the History column to view the following information:
l History
To filter the information in the task details, enter a text string in the search field.
This can be useful when troubleshooting warnings and errors.
Show Status Select which tasks to view from the dropdown list, based on their status. The
available options are: All, Pending, Running, Canceling, Canceled , Done, Error,
Aborting, Aborted, and Warning.
Column Settings Select the columns you want to display from the dropdown.
Description The nature of the task. Double-click the task to display the specific actions taken
under this task.
Mail Server
A mail server allows the FortiAnalyzer to sent email messages, such as notifications when reports are run or specific
events occur. Mail servers can be added, edited, deleted, and tested.
Go to System Settings > Advanced > Mail Server to configure SMTP mail server settings.
If an existing mail server is in use, the delete icon is removed and the mail server entry cannot
be deleted.
3. Configure the following settings and then select OK to create the mail server.
SMTP Server Port Enter the SMTP server port number. The default port is 25.
Email Account Enter an email account. This option is only accessible when authentication is
enabled.
Password Enter the email account password. This option is only accessible when
authentication is enabled.
Syslog Server
Go to System Settings > Advanced > Syslog Server to configure syslog server settings. Syslog servers can be added,
edited, deleted, and tested.
After adding a syslog server, you must also enable FortiAnalyzer to send local logs to the syslog server. See Send local
logs to syslog server on page 400.
If an existing syslog server is in use, the delete icon is removed and the server entry cannot be
deleted.
3. Configure the following settings and then select OK to create the syslog server.
IP address (or FQDN) Enter the IP address or FQDN of the syslog server.
FortiAnalyzer supports IPv4 and IPv6 addresses.
Syslog Server Port Enter the syslog server port number. The default port is 514.
Reliable Connection Enable or disable a reliable connection with the syslog server. The default is
disable.
After adding a syslog server to FortiAnalyzer, the next step is to enable FortiAnalyzer to send local logs to the syslog
server. See Syslog Server on page 398.
You can only enable these settings by using the CLI.
config system locallog syslogd setting
set severity information
set status enable
set syslog-name <syslog server name>
end
Meta Fields
Meta fields allow administrators to add additional attributes to objects and administrators. You can make meta fields
required or optional.
When meta fields are required, administrators must supply additional information when they create an associated object.
For example, if you create a required meta field for a device object, administrators must define a value for that meta field
for all devices.
Go to System Settings > Advanced > Meta Fields to configure meta fields. Meta fields can be added, edited, and deleted.
Select Expand All or Collapse All from the toolbar or right-click menu to view all or none of the
meta fields under each object.
Object The object this metadata field applies to: Administrative Domains, Devices,
Device Groups, Device VDOM, or System Administrator.
Length Select the maximum number of characters allowed for the field from the
dropdown list: 20, 50, or 255.
Importance Select Required to make the field compulsory; otherwise, select Optional.
5. Click OK.
The meta field is created.
Device logs
The FortiAnalyzer allows you to log system events to disk. You can control device log file size and the use of the
FortiAnalyzer unit’s disk space by configuring log rolling and scheduled uploads to a server.
As the FortiAnalyzer unit receives new log items, it performs the following tasks:
l Verifies whether the log file has exceeded its file size limit.
l Checks to see if it is time to roll the log file if the file size is not exceeded.
When a current log file (tlog.log) reaches its maximum size, or reaches the scheduled time, the FortiAnalyzer unit
rolls the active log file by renaming the file. The file name will be in the form of xlog.N.log (for example,
tlog.1252929496.log), where x is a letter indicating the log type and N is a unique number corresponding to the time
the first log entry was received. The file modification time will match the time when the last log was received in the log file.
Once the current log file is rolled into a numbered log file, it will not be changed. New logs will be stored in the new
current log called tlog.log. If log uploading is enabled, once logs are uploaded to the remote server or downloaded via
the GUI, they are in the following format:
FG3K6A3406600001-tlog.1252929496.log-2017-09-29-08-03-54.zst
If you have enabled log uploading, you can choose to automatically delete the rolled log file after uploading, thereby
freeing the amount of disk space used by rolled log files. If the log upload fails, such as when the FTP server is
unavailable, the logs are uploaded during the next scheduled upload.
Log rolling and uploading can be enabled and configured using the GUI or CLI.
Go to System Settings > Advanced > Device Log Setting to configure device log settings.
Roll log file when size exceeds Enter the log file size, from 10 to 500MB. Default: 200MB.
Roll log files at scheduled time Select to roll logs daily or weekly.
l Daily: select the hour and minute value in the dropdown lists.
l Weekly: select the day, hour, and minute value in the dropdown
lists.
Upload logs using a standard file Select to upload logs and configure the following settings.
transfer protocol
User Name Enter the username used to connect to the upload server.
Remote Directory Enter the remote directory on the upload server where the log will be
uploaded.
Upload Log Files Select to upload log files when they are rolled according to settings
selected under Roll Logs, or daily at a specific hour.
Upload rolled files in Select to compress the logs before uploading. This will result in smaller
compressed file format logs and faster upload times.
Delete files after Select to remove device log files from the FortiAnalyzer system after
uploading they have been uploaded to the Upload Server.
Send the local event logs to Select to send local event logs to another FortiAnalyzer or FortiManager
FortiAnalyzer / FortiManager device.
Severity Level Select the minimum log severity level from the dropdown list. This
option is only available when Upload Option is Realtime.
Secure connection Select to use a secure connection for log transmission. This option is
only available when Reliable log transmission is selected.
Peer Certificate CN Enter the certificate common name of syslog server. Null means no
certificate CN for the syslog server.
This option is only available when Reliable log transmission is enabled.
Log rolling and uploading can be enabled and configured using the CLI. For more information, see the FortiAnalyzer CLI
Reference.
Use the following CLI commands to enable or disable log file uploads.
Use the following CLI commands to specify the size, in MB, at which a log file is rolled.
Use the following CLI commands to configure rolling logs on a set schedule, or never.
The FortiAnalyzer can be set to upload logs to cloud storage. Before enabling this feature, you must have a valid Storage
Connector Service license. See License Information widget on page 58.
For information on setting up a storage fabric connector, see Creating or editing storage connectors on page 375.
l In the Remote Path box, type the bucket or container name from the storage account.
Before logs can be uploaded to cloud storage using Amazon S3, Azure Blob, or Google connectors, the cloud provider's
CA certificate(s) must be imported into FortiAnalyzer.
Third-party CA certificates, for example GlobalSign and CyberTrust, may be required. Check with your cloud storage
provider to see which CA certificates are supported.
For information on how to import certificates into FortiAnalyzer, see CA certificates on page 379.
File Management
FortiAnalyzer allows you to configure automatic deletion of device log files, quarantined files, reports, and content
archive files after a set period of time.
Go to System Settings > Advanced > File Management to configure file management settings.
Device log files older than Select to enable automatic deletion of compressed log files.
Enter a value in the text field, select the time period (Days, Weeks, or Months),
and choose a time of day.
Reports older than Select to enable automatic deletion of reports of data from compressed log files.
Enter a value in the text field, select the time period, and choose a time of day.
Content archive files older Select to enable automatic deletion of IPS and DP archives from Archive logs.
than Enter a value in the text field, select the time period, and choose a time of day.
Quarantined files older than Select to enable automatic deletion of compressed log files of quarantined files.
Enter a value in the text field, select the time period, and choose a time of day.
The time period you select determines how often the item is checked. If you select Months, then the item is checked
once per month. If you select Weeks, then the item is checked once per week, and so on. For example, if you specify
Device log files older than 3 Months, then on July 1, the logs for April, May, and June are kept and the logs for March and
older are deleted.
Miscellaneous Settings
Go to System Settings > Advanced > Misc Settings to view and configure advanced settings and download WSDL files.
Configure the following settings and then select Apply:
Download WSDL file Select the required WSDL functions then click the Download button to download
the WSDL file to your management computer.
When selecting Legacy Operations, no other options can be selected.
Web services is a standards-based, platform independent, access method for
other hardware and software APIs. The file itself defines the format of commands
the FortiAnalyzer will accept as well as the responses to expect. Using the WSDL
file, third-party or custom applications can communicate with the FortiAnalyzer
unit and operate it or retrieve information, just as an administrator can from the
GUI or CLI.
Task List Size Set a limit on the size of the task list. Default: 2000.
FortiGuard
This section includes information on FortiGuard for FortiAnalyzer, and includes the following topics:
l Subscribing FortiAnalyzer to FortiGuard on page 407
l Licensing in an air-gap environment on page 408
l Enabling updates through a web proxy on page 411
When performing the initial setup of FortiAnalyzer, you are required to register your FortiAnalyzer to FortiCare, which
typically requires internet access. While operating in a closed network or air-gap environment, you must complete this
step by uploading the entitlements file through the FortiAnalyzer GUI or CLI.
1. In FortiAnalyzer, disable access to the public FortiGuard Distribution Servers (FDS) using the following
CLI commands:
config fmupdate publicnetwork
set status disable
end
2. Connect to the FortiAnalyzer GUI, and on the FortiAnalyzer login screen, click Upload License.
3. Click Browse to select your FortiAnalyzer license or drag-and-drop the license file, and click Upload.
The license file will be applied, and the FortiAnalyzer will be restarted in order to verify the license.
4. Sign in to FortiAnalyzer.
The FortiAnalyzer Setup Wizard is displayed.
In order to access your FortiAnalyzer, it must be registered to FortiCare in the FortiAnalyzer Setup Wizard.
5. On FortiCloud, create a ticket for your FortiAnalyzer entitlements file, and Fortinet Customer Service will provide you
with the file.
6. You can upload your entitlement file either through the setup wizard or through the FortiAnalyzer CLI.
a. Onboarding wizard:
i. Select Import the Entitlement File in the FortiAnalyzer Setup wizard.
ii. Drag and drop the entitlement file into the import area, or click Add Files to select the file location.
The <port> variable is only required when connecting to a remote SCP host. The
<directory>, <username>, and <password> variables are only required for
logging into a FTP server or SCP host to download the file. For more information,
see the FortiAnalyzer CLI Reference.
For example:
execute fmupdate ftp import license entitlement-file 172.10.1.10 /pub/place
user1 password1
This operation will replace the current package!
Do you want to continue? (y/n)y
Tunnel mode (default) uses port TCP/443. Proxy mode uses port TCP/80.
For more information about the variables, see the FortiAnalyzer CLI Reference.
This feature cannot be configured in the FortiAnalyzer GUI.
The System Settings administrator menus enable you to configure administrator accounts, access profiles, remote
authentication servers, and adjust global administrative settings for the FortiAnalyzer unit.
Administrator accounts are used to control access to the FortiAnalyzer unit. Local and remote authentication is
supported, as well as two-factor authentication. Administrator profiles define different types of administrators and the
level of access they have to the FortiAnalyzer unit, as well as its authorized devices.
Global administration settings, such as the GUI language and password policies, can be configured on the Admin
Settings pane. See Global administration settings on page 443 for more information.
This section contains the following topics:
l Trusted hosts on page 413
l Monitoring administrators on page 413
l Disconnecting administrators on page 414
l Managing administrator accounts on page 414
l Administrator profiles on page 423
l Authentication on page 430
l Global administration settings on page 443
l Multi-factor authentication on page 449
Trusted hosts
Setting trusted hosts for all of your administrators increases the security of your network by further restricting
administrative permissions. In addition to knowing the password, an administrator must connect only through the subnet
or subnets you specify. You can even restrict an administrator to a single IP address if you define only one trusted host
IP address with a netmask of 255.255.255.255.
When you set trusted hosts for all administrators, the FortiAnalyzer unit does not respond to administrative access
attempts and cannot be pinged from any other hosts. This provides the highest security. If you leave even one
administrator unrestricted, the unit accepts administrative access attempts on any interface that has administrative
access enabled, potentially exposing the unit to attempts to gain unauthorized access.
The trusted hosts you define apply to both the GUI and to the CLI when accessed through SSH. CLI access through the
console connector is not affected.
If you set trusted hosts and want to use the Console Access feature of the GUI, you must also
set 127.0.0.1/255.255.255.255 as a trusted host.
Monitoring administrators
The Admin Session List lets you view a list of administrators currently logged in to the FortiAnalyzer unit.
User Name The name of the administrator account. Your session is indicated by (current).
IP Address The IP address where the administrator is logging in from. This field also displays the
logon type (GUI, jsconsole, or SSH).
Start Time The date and time the administrator logged in.
Time Out (mins) The maximum duration of the session in minutes (1 to 480 minutes).
Disconnecting administrators
Administrators can be disconnected from the FortiAnalyzer unit from the Admin Session List.
To disconnect administrators:
Go to System Settings > Administrators to view the list of administrators and manage administrator accounts.
Only administrators with the Super_User profile can see the complete administrators list. If you do not have certain
viewing permissions, you will not see the administrator list. When ADOMs are enabled, administrators can only access
the ADOMs they have permission to access.
Create New Create a new administrator. See Creating administrators on page 415.
Edit Edit the selected administrator. See Editing administrators on page 420.
Change Password Change the selected administrator's password. This option is only available from
the right-click menu. See Editing administrators on page 420.
Profile The profile applied to the administrator. See Administrator profiles on page 423
JSON API Access The administrators read/write privileges for JSON API.
Comments Comments about the administrator account. This column is hidden by default.
Trusted IPv4 Hosts The IPv4 trusted host(s) associated with the administrator. See Trusted hosts on
page 413.
Trusted IPv6 Hosts The IPv6 trusted host(s) associated with the administrator. See Trusted hosts on
page 413. This column is hidden by default.
Contact Email The contact email associated with the administrator. This column is hidden by
default.
Contact Phone The contact phone number associated with the administrator. This column is
hidden by default.
FortiAI User Indicates if the user has access to use the FortiAI assistant. This feature is only
available with a valid FortiAI license. See FortiAI on page 280.
Creating administrators
To create a new administrator account, you must be logged in as a super user administrator.
For remote or PKI authentication, the authentication must be configured before you create the
administrator. See Authentication on page 430 for details.
3. Configure the following settings, and then click OK to create the new administrator.
User Name Enter the name of the administrator will use to log in.
Comments Optionally, enter a description of the administrator, such as their role, location,
or the reason for their account.
Admin Type Select the type of authentication the administrator will use when logging into
the FortiAnalyzer unit. One of: LOCAL, RADIUS, LDAP, TACACS+, PKI,
Group, or SSO. See Authentication on page 430 for more information.
Server or Group Select the RADIUS server, LDAP server, TACACS+ server, or group, as
required.
The server must be configured prior to creating the new administrator.
This option is not available if the Admin Type is LOCAL or PKI.
Match all users on remote Select this option to automatically add all users from a LDAP server specified
server in Admin>Remote Authentication Server. All users specified in the
Distinguished Name field in the LDAP server will be added as FortiManager
users with the selected Admin Profile.
Select this option when the Admin Type is SSO to create one SAML SSO
wildcard admin user to match all users on the identity provider (IdP) server.
This FortiAnalyzer must be configured as a service provider (SP), added to the
IdP, and have the same user profile and ADOM names as the IdP. If this is
done, the user is assigned the same profile and ADOMs when logging in as an
SSO user on this SP. See SAML admin authentication on page 438.
If this option is not selected, the User Name specified must exactly match the
LDAP user specified on the LDAP server.
This option is not available if the Admin Type is LOCAL or PKI.
Force this administrator to Force the administrator to change their password the next time that they log in
change password upon next to the FortiAnalyzer.
log on. This option is only available if Password Policy is enabled in Admin Settings.
See Password policy on page 445.
FortiToken Cloud Enable or disable multi-factor authentication with FortiToken Cloud, then
select the token delivery method from the following options:
l FortiToken Mobile: Use the FortiToken Mobile app to get tokens. The
Administrative Domain Choose the ADOMs this administrator will be able to access.
l All ADOMs: The administrator can access all the ADOMs.
l All ADOMs except specified ones: The administrator cannot access the
selected ADOMs.
l Specify: The administrator can access the selected ADOMs. Specifying
the ADOM shows the Specify Device Group to Access check box. Select
the Specify Device Group to Access check box and select the Device
Group this administrator is allowed to access. The newly created
administrator will only be able to access the devices within the Device
Group and sub-groups.
If the Admin Profile is Super_User, then this setting is All ADOMs.
This field is available only if ADOMs are enabled. See Administrative Domains
(ADOMs) on page 364.
Admin Profile Select an administrator profile from the list. The profile selected determines
the administrator’s access to the FortiAnalyzer unit’s features. See
Administrator profiles on page 423.
If the Administrative Domain is Specify, you can select Single or Per-ADOM.
l Single (default): Select one admin profile to apply for all ADOMs the
JSON API Access Select the permission for JSON API Access. Select Read-Write, Read, or
None. The default is None.
Theme Mode Select Use Global Theme to apply a theme to all administrator accounts.
Select Use Own Theme to allow administrators to select their own theme.
Trusted Hosts Optionally, turn on trusted hosts, then enter their IP addresses and netmasks.
Up to ten IPv4 and ten IPv6 hosts can be added.
See Trusted hosts on page 413 for more information.
FortiAI User When FortiAnalyzer has a valid FortiAI license, you can enable this field to
enable access to the FortiAI assistant for this user.
Meta Fields Optionally, enter the new administrator's email address and phone number.
Advanced options
fingerprint Specify the user certificate fingerprint based on MD5, SHA-1, or SHA- -
256 hash function.
This option is only available if the Admin Type is PKI.
Editing administrators
To edit an administrator, you must be logged in as a super user administrator. The administrator's name cannot be
edited. An administrator's password can be changed using the right-click menu, if the password is not a wildcard.
To edit an administrator:
The current administrator's password can also be changed from the admin menu in the GUI
banner. See GUI overview on page 27 for information.
Deleting administrators
FortiAnalyzer administrator accounts can be configured to use the RPC Permit (JSON API Access) and Trusted Hosts
attributes that are defined by an administrator profile.
When an administrator has been configured to use the attributes from the profile, the attributes can no longer be
changed by editing the administrator account.
This feature can only be configured from the FortiAnalyzer CLI.
For more information, see the FortiAnalyzer CLI Reference Guide on the Fortinet Document Library.
To use RPC Permit and Trusted Host administrator attributes from a profile:
Administrator profiles
Administrator profiles are used to control administrator access privileges to devices or system features. Profiles are
assigned to administrator accounts when an administrator is created. The profile controls access to both the
FortiAnalyzer GUI and CLI.
There are the following predefined system profiles:
Restricted_User Restricted user profiles have no system privileges enabled, and have read-only
access for all device privileges.
Standard_User Standard user profiles have no system privileges enabled, and have read/write
access for all device privileges.
Super_User Super user profiles have all system and device privileges enabled. It cannot be
edited.
Password_Change_User Password change user profiles can only change passwords using the CLI or API
and have no access to the FortiAnalyzer GUI or other features.
These profiles cannot be deleted, but standard and restricted profiles can be edited. New profiles can also be created as
required. Only super user administrators can manage administrator profiles.
Go to System Settings > Admin Profiles to view and manage administrator profiles.
The following options are available:
Create New Create a new administrator profile. See Creating administrator profiles on page
427.
Edit Edit the selected profile. See Editing administrator profiles on page 429.
Clone Clone the selected profile. See Cloning administrator profiles on page 429.
Delete Delete the selected profile or profiles. See Deleting administrator profiles on page
430.
Description A description of the system and device access permissions allowed for the
selected profile.
Permissions
The below table lists the default permissions for the Super_User, Standard_User, and Restricted_User administrator
profiles.
When Read-Write is selected, the user can view and make changes to the FortiAnalyzer system. When Read-Only is
selected, the user can only view information. When None is selected, the user can neither view or make changes to the
FortiAnalyzer system.
Privacy Masking
Use Privacy Masking to help protect user privacy by masking user information. You can select which fields to mask.
Masked fields show anonymous data. You can unmask and see the original data by entering the Data Mask Key that you
specify in the administrator profile.
When Privacy Masking is enabled in an administrator profile, the configured fields will be masked for those
administrators. These administrators will have a See Original Data button in the banner, which they can use to unmask
data when appropriate if they have the configured data mask key.
Privacy masking can be used to support compliance to the General Data Protection Regulation (GDPR). An Admin
Profile can be created that masks all fields that may contain personal data relevant to the definitions of GDPR. The
administrators assigned this profile can view the fields to perform their work in FortiAnalyzer, but the data will be
anonymized. The anonymized data is different for each administrator and the anonymization is changed at each login to
prevent opportunity for identification. When the anonymized data is required for processing, the administrator can use a
data mask key to unmask the data. Only the selected data is unmasked, leaving all other masked data anonymized.
1. In any list showing masked data, click See Original Data in the banner and select Screen Picker or Manual Input.
2. If you select Screen Picker, click a masked field in the current pane.
The Unmask Protected Data dialog displays with the field you clicked already entered.
If you selected Manual Input, enter the Masked Text.
3. Enter the Data Mask Key that was configured in the Admin Profile and click OK.
The original data appears in the Unmasked Text field.
To create a new administrator profile, you must be logged in to an account with sufficient privileges, or as a super user
administrator.
Permissions Select None, Read Only, or Read-Write access for the categories
as required.
Masked Data Fields Select the fields to mask: Destination Name, Source IP,
Destination IP, User, Source Name, Email, Message, and/or
Source MAC.
Data Mask Key Enter the data masking encryption key. You need the Data Mask
Key to see the original data.
Data Unmasked Time(0- Enter the number of days the user assigned to this profile can see
365 Days) all logs without masking.
The logs are masked if the time period in the Log View toolbar is
greater than the number of days in the Data Masked Time field.
Incident and event profile permissions allow security analysts to access the Incidents & Events module while preventing
them from making changes to configurations that will affect the SLA.
Permission Description
Create & Update Incidents Allows analysts to create and update incidents.
Triage Event Allows analysts to acknowledge, comment, view logs, create new incidents,
and add to existing incidents.
To edit an administrator profile, you must be logged in to an account with sufficient privileges, or as a super user
administrator. The profile's name cannot be edited. The Super_User profile cannot be edited, and the predefined profiles
cannot be deleted.
To edit an administrator:
To clone an administrator profile, you must be logged in to an account with sufficient privileges, or as a super user
administrator.
To edit an administrator:
To delete a profile or profiles, you must be logged in to an account with sufficient privileges, or as a super user
administrator. The predefined profiles cannot be deleted.
Authentication
The FortiAnalyzer system supports authentication of administrators locally, remotely with RADIUS, LDAP, or TACACS+
servers, and using PKI. Remote authentication servers can also be added to authentication groups that administrators
can use for authentication.
Security Assertion Markup Language (SAML) authentication can be enabled across all Security Fabric devices, enabling
smooth movement between devices for the administrator. FortiAnalyzer can play the role of the identity provider (IdP) or
the service provider (SP) when an external identity provider is available. See SAML admin authentication on page 438.
To use PKI authentication, you must configure the authentication before you create the administrator accounts. See
Public Key Infrastructure on page 430 for more information.
To use remote authentication servers, you must configure the appropriate server entries in the FortiAnalyzer unit for
each authentication server in your network. New LDAP remote authentication servers can be added and linked to all
ADOMs or specific ADOMs. See LDAP servers on page 433, RADIUS servers on page 435, TACACS+ servers on page
437, and Remote authentication server groups on page 437 for more information.
Public Key Infrastructure (PKI) authentication uses X.509 certificate authentication library that takes a list of peers, peer
groups, and user groups and returns authentication successful or denied notifications. Administrators only need a valid
X.509 certificate for successful authentication; no username or password is necessary.
To use PKI authentication for an administrator, you must configure the authentication before you create the administrator
accounts. You will also need the following certificates:
l an X.509 certificate for the FortiManager administrator (administrator certificate)
l an X.509 certificate from the Certificate Authority (CA) which has signed the administrator’s certificate (CA
Certificate)
For more information on the CSR generation process, see Local certificates on page 376.
3. Select the certificate and select Export in the toolbar to save the ca_fortinet.com CA certificate to your
management computer. The saved CA certificate’s filename is ca_fortinet.com.crt.
1. In Mozilla Firefox, go to Options > Advanced > Certificates > View Certificates > Import.
2. Select the file admin_fortinet.com.p12 and enter the password used in the previous step.
PKI authentication must be enabled via the FortiAnalyzer CLI with the following commands:
config system global
set clt-cert-req enable
end
When connecting to the FortiAnalyzer GUI, you must use HTTPS when using PKI certificate
authentication.
When clt-cert-req is set to optional, the user can use certificate authentication or user
credentials for GUI login.
The FortiAnalyzer system supports remote authentication of administrators using LDAP, RADIUS, and TACACS+
remote servers. To use this feature, you must configure the appropriate server entries for each authentication server in
your network, see LDAP servers on page 433, RADIUS servers on page 435, and TACACS+ servers on page 437 for
more information.
Remote authentication servers can be added, edited, deleted, and added to authentication groups (CLI only).
Go to System Settings > Remote Authentication Server to manage remote authentication servers.
Create New Add an LDAP, RADIUS, or TACACS+ remote authentication server. See LDAP
servers on page 433, RADIUS servers on page 435, and TACACS+ servers on
page 437.
Edit Edit the selected remote authentication server. See Editing remote authentication
servers on page 432.
Delete Delete the selected remote authentication server or servers. See Deleting remote
authentication servers on page 433.
ADOM The administrative domain(s) which are linked to the remote authentication
server.
To edit a remote authentication server, you must be logged in to an account with sufficient privileges, or as a super user
administrator. The server's name cannot be edited.
3. Edit the settings as required, and then select OK to apply the changes.
See LDAP servers on page 433, RADIUS servers on page 435, and TACACS+ servers on page 437 for more
information.
To delete a remote authentication server or servers, you must be logged in to an account with sufficient privileges, or as
a super user administrator.
LDAP servers
Lightweight Directory Access Protocol (LDAP) is an Internet protocol used to maintain authentication data that may
include departments, people, groups of people, passwords, email addresses, and printers. LDAP consists of a data-
representation scheme, a set of defined operations, and a request/response network.
If you have configured LDAP support and an administrator is required to authenticate using an LDAP server, the
FortiAnalyzer unit sends the administrator’s credentials to the LDAP server for authentication. If the LDAP server can
authenticate the administrator, they are successfully authenticated with the FortiAnalyzer unit. If the LDAP server cannot
authenticate the administrator, the FortiAnalyzer unit refuses the connection.
FortiAnalyzer.
l Apply the principle of least privilege. For the LDAP regular bind operation, do not use
credentials that provide full administrative access to the Windows server when using
credentials.
To use an LDAP server to authenticate administrators, you must configure the server before configuring the
administrator accounts that will use it.
3. Configure the following settings, and then click OK to add the LDAP server.
Server Name/IP Enter the IP address or fully qualified domain name of the LDAP server.
Port Enter the port for LDAP traffic. The default port is 389.
Common Name Identifier The common name identifier for the LDAP server. Most LDAP servers use cn.
However, some servers use other common name identifiers such as UID.
Distinguished Name The distinguished name is used to look up entries on the LDAP server.
The distinguished name reflects the hierarchy of LDAP database object
classes above the common name identifier. Clicking the query distinguished
name icon will query the LDAP server for the name and open the LDAP
Distinguished Name Query window to display the results.
Bind Type Select the type of binding for LDAP authentication: Simple, Anonymous, or
Regular.
User DN When the Bind Type is set to Regular, enter the user DN.
Password When the Bind Type is set to Regular, enter the password.
Secure Connection Select to use a secure LDAP server connection for authentication.
Certificate When Secure Connection is enabled, select the certificate from the dropdown
list.
Administrative Domain Choose the ADOMs that this server will be linked to for reporting: All ADOMs
(default), or Specify for specific ADOMs.
Advanced Options
memberof-attr Specify the value for this attribute. This value must match the attribute of the
group in LDAP Server. All users part of the LDAP group with the attribute
matching the memberof-attr will inherit the administrative permissions
specified for this group.
RADIUS servers
Remote Authentication Dial-in User (RADIUS) is a user authentication and network-usage accounting system. When
users connect to a server they type a user name and password. This information is passed to a RADIUS server, which
authenticates the user and authorizes access to the network.
You can create or edit RADIUS server entries in the server list to support authentication of administrators. When an
administrator account’s type is set to RADIUS, the FortiAnalyzer unit uses the RADIUS server to verify the administrator
password at log on. The password is not stored on the FortiAnalyzer unit.
To use a RADIUS server to authenticate administrators, you must configure the server before configuring the
administrator accounts that will use it.
3. Configure the following settings, and then click OK to add the RADIUS server.
Server Name/IP Enter the IP address or fully qualified domain name of the RADIUS server.
Port Enter the port for RADIUS traffic. The default port is 1812. Some RADIUS
servers use port 1645.
Server Secret Enter the RADIUS server secret. Click the eye icon to Show or Hide the server
secret.
Test Connectivity Click Test Connectivity to test the connectivity with the RADIUS server. Shows
success or failure.
Test User Credentials Click Test User Credentials to test the user credentials. Shows success or
failure.
Secondary Server Name/IP Enter the IP address or fully qualified domain name of the secondary RADIUS
server.
Authentication Type Select the authentication type the RADIUS server requires. If you select the
default ANY, FortiAnalyzer tries all authentication types.
Advanced Options
nas-ip Specify the IP address for the Network Attached Storage (NAS).
TACACS+ servers
Terminal Access Controller Access-Control System (TACACS+) is a remote authentication protocol that provides
access control for routers, network access servers, and other network computing devices via one or more centralized
servers. It allows a client to accept a user name and password and send a query to a TACACS authentication server.
The server host determines whether to accept or deny the request and sends a response back that allows or denies
network access to the user. The default TCP port for a TACACS+ server is 49.
If you have configured TACACS+ support and an administrator is required to authenticate using a TACACS+ server, the
FortiAnalyzer unit contacts the TACACS+ server for authentication. If the TACACS+ server can authenticate the
administrator, they are successfully authenticated with the FortiAnalyzer unit. If the TACACS+ server cannot
authenticate the administrator, the connection is refused by the FortiAnalyzer unit.
To use a TACACS+ server to authenticate administrators, you must configure the server before configuring the
administrator accounts that will use it.
3. Configure the following settings, and then click OK to add the TACACS+ server.
Server Name/IP Enter the IP address or fully qualified domain name of the TACACS+ server.
Port Enter the port for TACACS+ traffic. The default port is 49.
Server Key Enter the key to access the TACACS+ server. The server key can be a
maximum of 16 characters in length.
Authentication Type Select the authentication type the TACACS+ server requires. If you select the
default ANY, FortiAnalyzer tries all authentication types.
Remote authentication server groups can be used to extend wildcard administrator access. Normally, a wildcard
administrator can only be created for a single server. If multiple servers of different types are grouped, a wildcard
administrator can be applied to all of the servers in the group.
Multiple servers of the same type can be grouped to act as backups - if one server fails, the administrator can still be
authenticated by another server in the group.
To use a server group to authenticate administrators, you must configure the group before configuring the administrator
accounts that will use it.
Remote authentication server groups can only be managed using the CLI. For more information, see the FortiAnalyzer
CLI Reference.
To delete a group:
SAML can be enabled across devices, enabling smooth movement between devices for the administrator. FortiAnalyzer
can play the role of the identity provider (IdP) or the service provider (SP) when an external identity provider is available.
When FortiGate is acting as the IdP in a Security Fabric, FortiAnalyzer can be configured to automatically connect as a
Fabric SP, allowing for easy setup of SAML authentication. See Enabling SAML authentication in a Security Fabric on
page 178.
Devices configured to the IdP can be accessed through the Quick Access menu which appears in the top-right corner of
the main menu. The current device is indicated with an asterisk (currently only supported between FAZ/FMG).
Logging into an SP device will redirect you to the IdP login page. By default, it is a Fortinet login page. After successful
authentication, you can access other SP devices from within the same browser without additional authentication.
When FortiAnalyzer is registered to FortiCloud, you can enable Allow admins to login with FortiCloud. This feature allows
administrators to log in to FortiAnalyzer using their FortiCloud SSO account credentials. See FortiCloud SSO admin
authentication on page 441.
The admin user must be created on both the IdP and SP, otherwise you will see an error
message stating that the admin doesn't exist.
Alternatively, you can configure the ADOM and profile names in the SP to match the IdP.
When this is done, you can create one SAML SSO wildcard admin user on the SP to match all
users on the IdP server.
When accessing FortiGate from the Quick Access menu, if FGT is set up to use the default
login page with SSO options, you must select the via Single Sign-On button to be
automatically authenticated.
IdP Prefix Copy the IdP prefix. This will be required when configuring your service
providers.
SAML Attributes SAML attributes can be added to a service provider to specify ADOM and/or
profile names.
FortiAnalyzer acting as IdP supports the following SAML attributes:
l Type: Username, Attribute: username
FortiAnalyzer service provider are signed. A valid SP certificate is required to enable this option.
l Require Assertions Signed from IdP: Enable this setting to require that all assertions received from the IdP are
signed.
5. Configure the IdP Settings:
a. Select the IdP type as Fortinet or Custom.
b. Enter the IdP Address and the Prefix that you obtained while configuring the IdP device.
c. Select the IdP certificate. If this is a first-time set up, you can import the IdP certificate that you downloaded
while configuring the IdP device.
6. Confirm that the information is correct and select Apply.
7. Repeat the steps for each FAZ/FMG that is to be set as a service provider.
For information on configuring FortiAnalyzer as an SP in a Security Fabric, see: Enabling SAML authentication in a
Security Fabric on page 178.
The following SAML attributes are accepted by FortiAnalyzer SAML service provider.
profilename The Profile assigned to the user. If a matching profile exists on the FortiAnalyzer, it will be
assigned to the user. This attribute is optional.
Example:
<Attribute Name="profilename">
<AttributeValue>SSOPROFILE</AttributeValue>
</Attribute>
adoms The ADOM(s) to which the user will have access. Multiple ADOMs can be specified in the
SAML assertion if supported by the IdP. This attribute is optional.
Example:
<Attribute Name="adoms">
<AttributeValue>ADOM1</AttributeValue>
<AttributeValue>ADOM2</AttributeValue>
</Attribute>
You can use the following command in the CLI to verify the correct adoption of the SAML attributes by FortiAnalyzer.
diagnose system admin-session list
For example:
diagnose system admin-session list
*** entry 0 ***
session_id: 57410 (seq: 0)
username: user1
admin template: SSO
from: SSO(192.168.50.188) (type 7)
profile: SSOPROFILE
adom: adom1
session length: 3 (seconds)
When FortiAnalyzer is registered to FortiCloud, you can enable login to FortiAnalyzer using your FortiCloud
SSO account.
By default, only the FortiCloud account ID which the FortiAnalyzer is registered to can be used to log into FortiAnalyzer.
Additional SSO users can be configured as IAM users in FortiCloud. See IAM user account login on page 442.
1. Before enabling this feature, FortiAnalyzer must be registered to FortiCloud, and a FortiCloud account must be
configured.
You can check your FortiCloud registration status in Dashboards > Status in the License Information widget.
2. Go to System Settings > SAML SSO, and enable Allow admins to login with FortiCloud.
4. Click Login with FortiCloud. Enter your login credentials from FortiCloud and click LOGIN.
FortiCloud supports the creation of additional users called IAM users. Once created, you can use the IAM user account
to sign in to FortiAnalyzer.
1. In FortiCloud, create one or more additional IAM user accounts. See Identity and Access Management (IAM).
The IAM users must have the following portal included in their Permission Profile:
l FortiOS SSO
l Access = enabled
l Access Type = Admin
2. In FortiAnalyzer, enable Allow admins to login with FortiCloud in System Settings > SAML SSO.
3. Sign out of FortiAnalyzer, return to the FortiAnalyzer sign on page, and click Login with FortiCloud.
4. At the bottom of the FortiCloud login portal, click Sign in as IAM user.
The administration settings page provides options for configuring global settings for administrator access to the
FortiAnalyzer device. Settings include:
l Ports for HTTPS and HTTP administrative access
To improve security, you can change the default port configurations for administrative connections to the
FortiAnalyzer. When connecting to the FortiAnalyzer unit when the port has changed, the port must be included,
such as https://<ip_address>:<port>. For example, if you are connecting to the FortiAnalyzer unit using
port 8080, the URL would be https://192.168.1.99:8080. When you change to the default port number for
HTTP, HTTPS, or SSH, ensure that the port number is unique.
l Idle timeout settings
By default, the GUI disconnects administrative sessions if no activity occurs for five minutes. This prevents
someone from using the GUI if the management computer is left unattended.
l GUI language
The language the GUI uses. For best results, you should select the language used by the management computer.
l GUI theme
The default color theme of the GUI is Blueberry. You can choose another color or an image.
l Password policy
Enforce password policies for administrators.
Only super user administrators can access and configure the administration settings. The
settings are global and apply to all administrators of the FortiAnalyzer unit.
2. Configure the following settings as needed, then click Apply to save your changes to all administrator accounts:
Administration Settings
HTTP Port Enter the TCP port to be used for administrative HTTP access. Default: 80.
Select Redirect to HTTPS to redirect HTTP traffic to HTTPS.
HTTPS Port Enter the TCP port to be used for administrative HTTPS access. Default: 443.
Idle Timeout Enter the number of seconds an administrative connection can be idle before
the administrator must log in again, from 60 to 28800 (eight hours). See Idle
timeout on page 447 for more information.
Idle Timeout (API) Enter the number of seconds an administrative connection to the API can be
idle before the administrator must log in again, from 1 to 28800 (eight hours).
Default: 900.
Idle Timeout (GUI) Enter the number of seconds an administrative connection to the GUI can be
idle before the administrator must log in again, from 60 to 28800 (eight hours).
Default: 900.
View Settings
Language Select a language from the dropdown list. See GUI language on page 447 for
more information.
High Contrast Toggle ON to enable a high contrast dark theme in order to make the
Theme FortiAnalyzer GUI more accessible, and to aid people with visual disability in
using the FortiAnalyzer GUI.
Other Themes Select a theme for the GUI. The selected theme is not applied until you click
Apply, allowing to you to sample different themes. Default: Jade.
Password Policy Click to enable administrator password policies. See Password policy on page
445 and Password lockout and retry attempts on page 446 for more
information.
Minimum Length Select the minimum length for a password, from 8 to 32 characters. Default: 8.
Admin Password Select the number of days a password is valid for, after which it must be
Expires after changed.
Enforce Password Enable to set the number of unique new passwords that must be used before
History an old password can be reused, from 1 to 20.
Authorization Port If a non-default port is used for the management port of FortiAnalyzer, specify
the custom port.
Password policy
You can enable and configure password policy for the FortiAnalyzer.
When a password policy is enabled, only the current password is remembered for each user in
password reuse history.
Minimum Length Specify the minimum number of characters that a password must be, from 8 to 32.
Default: 8.
Must Contain Specify the types of characters a password must contain: uppercase and lowercase
letters, numbers, and/or special characters.
Admin Password Specify the number of days a password is valid for. When the time expires, an
Expires after administrator will be prompted to enter a new password.
Enforce Password Enable to set the number of unique new passwords that must be used before an old
History password can be reused, from 1 to 20.
By default, the number password retry attempts is set to three, allowing the administrator a maximum of three attempts
at logging in to their account before they are locked out for a set amount of time (by default, 60 seconds).
The number of attempts and the default wait time before the administrator can try to enter a password again can be
customized. Both settings can be configured using the CLI.
Example
To set the lockout threshold to one attempt and set a five minute duration before the administrator can try to log in again,
enter the following CLI commands:
config system global
set admin-lockout-duration 300
set admin-lockout-threshold 1
end
GUI language
Idle timeout
To ensure security, the idle timeout period should be short. By default, administrative sessions are disconnected if no
activity takes place for 900 seconds (15 minutes). This idle timeout is recommended to prevent anyone from using the
GUI on a PC that was logged in to the GUI and then left unattended.
There are multiple idle timeout settings, which allows you to control idle timeout for API, GUI, and SSO sessions
individually. The Idle Timeout setting controls all other idle timeout, including the idle timeout for SSH and console.
The idle timeout for SSO can only be set in the CLI using the following command:
config system admin setting
set idle_timeout_sso <integer>
end
For more information, see the FortiAnalyzer CLI Reference in the Fortinet Document Library.
5. Click Apply.
If you need to set the idle timeout for SSO sessions, you must use the FortiAnalyzer CLI.
When using FortiOS to create a Security Fabric connection to FortiAnalyzer, the process includes device authorization.
The authorization process uses a browser popup window that requires communication to FortiAnalyzer. Depending on
the topology, communication might fail, unless you specify the accessible management IP address and/or port of
FortiAnalyzer that the browser popup window in FortiOS can use to connect with FortiAnalyzer.
FortiOS retrieves this information from FortiAnalyzer and makes it available to the browser popup window used for the
authorization process.
Authorization Port If a non-default port is used, type the port number used for GUI access to
FortiAnalyzer.
3. Click Apply.
Administrative access to FortiAnalyzer can be controlled by a IPv4/IPv6 local-in policy. This feature can only be
configured using the FortiAnalyzer CLI.
For more information, see the FortiAnalyzer CLI Reference Guide on the Fortinet Docs Library.
Multi-factor authentication
To configure two-factor authentication for administrators with FortiAuthenticator you will need the following:
l FortiAnalyzer
l FortiAuthenticator
l FortiToken
Configuring FortiAuthenticator
On the FortiAuthenticator, you must create a local user and a RADIUS client.
Before proceeding, ensure you have configured your FortiAuthenticator, created a NAS entry
for your FortiAnalyzer, and created or imported FortiTokens.
For more information, see the RADIUS Interoperability Guide and FortiAuthenticator
Administration Guide in the Fortinet Document Library.
Enable account expiration Optionally, select to enable account expiration. For more information see the
FortiAuthenticator Administration Guide.
Password-based Leave this option selected. Select [Change Password] to change the
authentication password for this local user.
Enable account expiration Optionally, select to enable account expiration. For more information see the
FortiAuthenticator Administration Guide.
User Role
Full Permission Select to allow Full Permission, otherwise select the admin profiles to apply to
the user. This option is only available when Role is Administrator.
Web service Select to allow Web service, which allows the administrator to access the web
service via a REST API or by using a client application. This option is only
available when Role is Administrator.
Restrict admin Select to restrict admin login from trusted management subnets only, then
login from trusted enter the trusted subnets in the table. This option is only available when Role
management is Administrator.
subnets only
Allow LDAP Select to allow LDAP browsing. This option is only available when Role is
Browsing User.
Client name/IP Enter the IP address or Fully Qualified Domain Name (FQDN) of the
FortiAnalyzer.
Secret Enter the server secret. This value must match the FortiAnalyzer RADIUS
server setting at System Settings > Remote Authentication Server.
Apply this profile based on Select to apply the profile based on RADIUS attributes.
RADIUS attributes
Authentication method Select Enforce two-factor authentication from the list of options.
Check machine Select to check machine based authentication and apply groups based on the
authentication success or failure of the authentication.
For more information, see the FortiAuthenticator Administration Guide, available in the
Fortinet Document Library.
Configuring FortiAnalyzer
On the FortiAnalyzer, you need to configure the RADIUS server and create an administrator that uses the RADIUS
server for authentication.
Server Name/IP Enter the IP address or fully qualified domain name of your FortiAuthenticator.
Secondary Server Name/IP Enter the IP address or fully qualified domain name of the secondary
FortiAuthenticator, if applicable.
Authentication Type Select the authentication type the FortiAuthenticator requires. If you select the
default ANY, FortiAnalyzer tries all authentication types.
Note: RADIUS server authentication for local administrator users stored in
FortiAuthenticator requires the PAP authentication type.
sent an email to the specified address with a link to activate their token in
the FortiToken Mobile app on their mobile device. After FortiToken Mobile
app is activated, they will receive their token codes through the app.
l Country Dial Code: Select a country code for the mobile number.
l Mobile Number: Enter a valid mobile phone number for receiving SMS
messages.
4. Edit other fields as needed and click OK to save the administrator configuration.
When the FortiToken Cloud is registered to the same FortiCloud account as FortiAnalyzer and the license permits
adding a new user, the administrator is automatically synchronized to FortiToken Cloud with the specified
FortiToken Cloud MFA method. Otherwise, an error message is displayed.
You can view the user in FortiToken Cloud under User Management > Users. For more information, see the
FortiToken Cloud Administration Guide.
5. When the administrator logs in, they are prompted to enter the token code from their email, SMS, or FortiToken
Mobile app.
When devices with different licenses are used to create an HA cluster, the license that allows
for the smallest number of managed devices is used.
Configuring HA options
To configure HA options go to System Settings > HA and configure FortiAnalyzer units to create an HA cluster or change
cluster configuration.
In System Settings > HA, use the Cluster Settings pane to create or change HA configuration, and use the Cluster Status
pane to monitor HA status.
To configure a cluster, set the Operation Mode of the primary unit to Active-Passive or Active-Active. Then add the IP
addresses and serial numbers of each secondary unit to the primary unit peer list. The IP address and serial number of
the primary unit and all secondary units must be added to each secondary unit's HA configuration. The primary unit and
all secondary units must have the same Group Name, Group ID and Password.
You can connect to the primary unit GUI to work with FortiAnalyzer. Using configuration synchronization, you can
configure and work with the cluster in the same way as you work with a standalone FortiAnalyzer unit.
Cluster Settings
Operation Mode Select Active-Passive or Active-Active to configure the FortiAnalyzer unit for HA.
You can use Active-Active mode to create a geo-redundant solution. For more
information, see Geo-redundant HA on page 460.
Select Standalone to stop operating in HA mode.
Preferred Role Select the preferred role when this unit first joins the HA cluster.
If the preferred role is Primary, then this unit becomes the primary unit if it is
configured first in a new HA cluster. If there is an existing primary unit, then this
unit becomes a secondary unit.
The default is Secondary so that the unit can synchronize with the primary unit. A
secondary unit cannot become a primary unit until it is synchronized with the
current primary unit.
Cluster Virtual IP
IP Address The IP address for which the FortiAnalyzer HA unit is to provide redundancy.
Action Click the plus (+) to add another virtual IP. Click the x to remove a virtual IP from
the list.
Cluster Settings
Peer SN Type the serial number of the FortiAnalyzer unit corresponding to the entered IP
address.
Action Click the plus (+) to add another FortiAnalyzer unit in the cluster. Click the x to
remove a FortiAnalyzer unit from the cluster.
Group Name Type a group name that uniquely identifies the FortiAnalyzer HA cluster. All units
in a cluster must have the same Group Name, Group ID and Password.
Group ID Type a group ID from 1 to 255 that uniquely identifies the FortiAnalyzer
HA cluster.
Password A password for the HA cluster. All members of the HA cluster must have the same
password.
Heart Beat Interval The time the primary unit waits between sending heartbeat packets, in seconds.
The heartbeat interval is also the amount of time that secondary units waits before
expecting to receive a heartbeat packet from the primary unit.
By default, the Heart Beat Interval is set to 4.
Failover Threshold The number of seconds that one of the cluster units waits to receive HA heartbeat
packets from other cluster units before assuming that the other cluster units have
failed. This value corresponds to Heart Beat Interval x 3 and it is automatically
updated based on the configured Heart Beat Interval.
For example, the failure is detected after 12 seconds with the default settings:
l Heart Beat Interval: 4
l Failover Threshold: 12
The Heart Beat Interval can be increased or decreased to adapt to latency
conditions of your network and to detect legitimate failures.
Log Data Sync This option is on by default. It provides real-time log synchronization among
cluster members.
Log synchronization
To ensure logs are synchronized among all HA units, FortiAnalyzer HA synchronizes logs in two states: initial logs
synchronization and real-time log synchronization.
When you add a unit to an HA cluster, the primary unit synchronizes its logs with the new unit. After initial sync is
complete, the secondary unit automatically reboots. After the reboot, the secondary unit rebuilds its log database with
the synchronized logs.
You can see the status in the Cluster Status pane Initial Logs Sync column.
After the initial log synchronization, the HA cluster goes into real-time log synchronization state.
Log Data Sync is turned on by default for all units in the HA cluster.
When Log Data Sync is turned on in the primary unit, the primary unit forwards logs in real-time to all secondary units.
This ensures that the logs in the primary and secondary units are synchronized.
Log Data Sync is turned on by default in secondary units so that if the primary unit fails, the secondary unit selected to be
the new primary unit will continue to synchronize logs with secondary units.
If you want to use a FortiAnalyzer unit as a standby unit (not as a secondary unit), then you don't need real-time log
synchronization so you can turn off Log Data Sync.
Configuration synchronization
Configuration synchronization provides redundancy and load balancing among the cluster units. A FortiAnalyzer HA
cluster synchronizes the configuration of the following modules to all cluster units:
l Device Manager
l Incidents & Events
l Reports
l Most System Settings
FortiAnalyzer HA synchronizes most System Settings in the HA cluster. The following table shows which System Setting
configurations are synchronized:
Dashboard > System Information Only Administrative Domain is synchronized. All other settings in the
System Information widget are not synchronized.
Network No
HA No
Admin Yes
Event Log No
Geo-redundant HA
active-passive active-active
Only the HA primary can receive logs and archive files All HA members can receive logs and archive files from
from its directly connected device and forward them to HA its directly connected device and forward logs and
secondary. archive files to its HA peer.
Only the HA primary can forward data to the remote All HA members can forward its directly received logs and
server. archive file to the remote server.
In the examples below, the goal is to build an active-active geo-redundant layer 3 FortiAnalyzer HA cluster between two
data centers. The FortiAnalyzer HA members are located in different places. They are communicating with each other
via routers. There is no layer 2 connection.
Unicast must be enabled for the HA heartbeat in order for the cluster to operate in this mode.
This setting can only be configured from the CLI. For more information on enabling the unicast
heartbeat setting, see the FortiAnalyzer CLI Reference.
When unicast is enabled, VRRP packets are sent to the peer address instead of the multicast
address. VRRP (IP protocol 112) must be allowed through any connecting firewalls.
1. In the first FortiAnalyzer, configure the primary in System Settings > HA.
l For Operation Mode, select Active-Active.
l For Preferred Role, select Primary.
l Complete the other fields, including Peer IP and Peer SN.
l Cluster Virtual IP (VIP) is optional. It requires a layer 2 connection between HA members. If VIP is not
configured, select the interface which is used to communicate with the peer as Heart Beat Interface. You can
click the X icon next to the VIP entry to remove it.
2. In the second FortiAnalyzer, configure the primary in System Settings > HA.
l For Operation Mode, select Active-Active.
l For Preferred Role, select Secondary.
l Complete the other fields, including Peer IP and Peer SN.
l Cluster VIP is optional. It requires a layer 2 connection between HA members. If VIP is not configured, select
the interface which is used to communicate with the peer as Heart Beat Interface. You can click the X icon next
For more information about the FortiAnalyzer CLI commands, see the FortiAnalyzer 7.4 CLI Reference.
1. Configure the FortiAnalyzer HA.
When configuring the FortiAnalyzersystem ha, set mode to a-a. The vip is optional; if there is no layer 2
connection between HA members, vip will not work. In this case, set hb-interface as the interface which is
used to communicate with the peer.
a. Configure the first FortiAnalyzer. In the CLI, enter the following commands:
config system ha
set mode a-a
set group-id 100
set group-name "FAZVM64-HA"
set hb-interface "port1"
set unicast enable
set password xxxxxx
config peer
edit 1
set ip "192.168.1.101"
set serial-number "FAZ-VMTM-----6"
next
end
set preferred-role primary
set priority 120
end
b. Configure the second FortiAnalyzer. In the CLI, enter the following commands:
config system ha
set mode a-a
set group-id 100
set group-name "FAZVM64-HA"
set hb-interface "port1"
set unicast enable
set password xxxxxx
config peer
edit 1
set ip "192.168.2.102"
set serial-number "FAZ-VMTM-----7"
next
end
end
2. If the alternate FortiAnalyzer can be configured on FortiGate, set server to the HA primary and set alt-
server to the HA secondary. In the FortiGate CLI, enter:
config log fortianalyzer setting
set status enable
set ?
...
*server The main remote FortiAnalyzer.
alt-server The alternate remote FortiAnalyzer.
...
set server 192.168.2.102
set alt-server 192.168.1.101
...
end
3. If the alternate FortiAnalyzer cannot be configured on FortiGate, set server to a HA member which is reachable
from the FortiGate or to the VIP address of the FortiAnalyzer HA, if any. In the FortiGate CLI, enter:
config log fortianalyzer setting
set status enable
...
set server 192.168.2.102 (or 10.2.60.93)
...
end
Monitoring HA status
In System Settings > HA, the Cluster Status pane shows the HA status. This pane displays information about the role of
each cluster unit, the HA status of the cluster, and the HA configuration of the cluster.
You can use the CLI command diagnose ha status to display the same HA status
information.
If the primary unit becomes unavailable, another unit in the cluster is selected as the primary unit using the following
rules:
l All cluster units are assigned a priority from 80 – 120. The default priority is 100. If the primary unit becomes
unavailable, an available unit with the highest priority is selected as the new primary unit. For example, a unit with a
priority of 110 is selected over a unit with a priority of 100.
l If multiple units have the same priority, the unit whose primary IP address has the greatest value is selected as the
new primary unit. For example, 123.45.67.124 is selected over 123.45.67.123.
l If a new unit with a higher priority or a greater value IP address joins the cluster, the new unit does not replace (or
preempt) the current primary unit.
Load balancing
Because FortiAnalyzer HA synchronizes logs among HA units, the HA cluster can balance the load and improve overall
responsiveness. Load balancing enhances the following modules:
l Reports
l FortiView
When generating multiple reports, the loads are distributed to all HA cluster units in a round-robin fashion. When a report
is generated, the report is synchronized with other units so that the report is visible on all HA units.
Similarly, for FortiView, cluster units share some of the load when these modules generate output for their widgets.
For information on upgrading the FortiAnalyzer firmware for an operating cluster, see the FortiAnalyzer Upgrade Guide
on the Fortinet Docs Library.
This topic describes how to configure two FortiAnalyzer units as the Analyzer and Collector and make them work
together. In the scenario shown in the diagram below, Company A has a remote branch network with a FortiGate unit
and a FortiAnalyzer 400E in Collector mode. In its head office, Company A has another FortiGate unit and a
FortiAnalyzer 3000D in Analyzer mode. The Collector forwards the logs of the FortiGate unit in the remote branch to the
Analyzer in the head office for data analysis and reports generation. The Collector is also used for log archival.
For related concepts, see Operation modes on page 37 and Analyzer–Collector collaboration on page 39. You need to
complete the initial setup for your FortiAnalyzer units first. See Initial setup on page 35.
1. Ensure the FortiAnalyzer Operation Mode is Collector. See Configuring the operation mode on page 58.
2. Check and configure the storage policy for the Collector. See Log storage information on page 155.
For the Collector, you should allocate most of the disk space for Archive logs. You should
keep the Archive logs long enough to meet the regulatory requirements of your
organization. After this initial configuration, you can monitor the storage usage and adjust it
as you go.
If Keep Logs for Analytics is set to 0, the Analytics logs will be kept for unlimited days. For
more information, see Configuring log storage policy on page 157.
3. Set up log forwarding to enable the Collector to forward the logs to the Analyzer. See Log Forwarding on page 381.
In particular,
l Set Remote Server Type to FortiAnalyzer.
l Set Server IP to the IP address of the Analyzer that this Collector will forward logs to.
l Click Select Device and select the FortiGate device that the Collector will forward logs for.
1. Ensure the FortiAnalyzer Operation Mode is Analyzer. See Configuring the operation mode on page 58
2. Check and configure the storage policy for the Analyzer. See Log storage information on page 155.
For the Analyzer you should allocate most of the disk space for Analytics logs. You may
want to keep the Analytics logs for 30–90 days. After this initial configuration, you can
monitor the storage usage and adjust it as you go.
3. Make sure that the aggregation service is enabled on the Analyzer. If not, use this CLI command to enable it:
config system log-forward-service
set accept-aggregation enable
end
4. Add the FortiGate device of the remote office that the Collector will forward logs for. See Authorizing devices on
page 78.
Once the FortiGate of the remote office is added, the Analyzer starts receiving its logs from the Collector.
At times, you might want to fetch logs from the Collector to the Analyzer. The Collector will perform the role of the fetch
server, and the Analyzer will perform the role of fetch client. For information about how to conduct log fetching, see Log
Management Extensions
The Management Extensions pane allows you to enable licensed applications that are released and signed by Fortinet.
The applications are installed and run on FortiAnalyzer.
The Management Extensions pane is only displayed in the GUI after at least one management
extension application (MEA) is enabled and running on FortiAnalyzer.
You must enable your first MEA using the CLI; subsequent MEAs can be enabled using
the GUI.
A number of management extension applications (MEAs) are available. The following table identifies the available
applications and any ADOM requirements needed to access the application:
FortiSIEM MEA
You can enable the FortiSIEM management extension application (MEA) on FortiAnalyzer. FortiSIEM uses machine
learning to detect unusual user and entity behavior (UEBA) without requiring the administrator to write complex rules.
FortiSIEM helps identify insider and incoming threats that would pass traditional defenses. High fidelity alerts help
prioritize which threats need immediate attention.
For details about using FortiSIEM MEA, see the FortiSIEM MEA Administration Guide on the Document Library.
FortiSOAR MEA
You can enable the Fortinet Security Orchestration, Automation, and Response (FortiSOAR) management extension
application (MEA) on FortiAnalyzer, and use it to manage the entire lifecycle of a threat or breach within your
organization. For details about using FortiSOAR MEA, see the FortiSOAR MEA Administration Guide on the Document
Library.
FortiAnalyzer provides access to applications that are released and signed by Fortinet.
1. Go to Management Extensions.
l The first MEA used on FortiAnalyzer must be enabled using the CLI. After it is enabled and running, the
Management Extensions pane is displayed in the GUI and subsequent MEAs can be enabled in the GUI
following the steps below. For instructions on enabling your first MEA, see CLI for management extensions on
page 469.
l Some management applications are only available in the root ADOM or in specific ADOM versions.
3. Click OK in the dialog that appears. It might take some time to install the application.
You can use the CLI console to enable, disable, update, debug, and check the management extension.
FortiAnalyzer supports FortiSIEM MEA and FortiSOAR MEA. Although you can use the CLI to
enable additional management extension applications, they are not supported by
FortiAnalyzer. Enabled, unsupported management extension applications are hidden from the
FortiAnalyzer GUI, but still consume valuable resources. Be sure to only enable
FortiSIEM MEA and/or FortiSOAR MEA on FortiAnalyzer when using the CLI.
l The CLI commands allow you to set the resource limit globally for all management
extension applications.
l If management extension applications reach the limit of allocated FortiAnalyzer resource,
a warning appears in the Alert Message Console widget.
See also Checking for new versions and upgrading on page 471.
Event logs generated by a management extension are available in the local event log of FortiAnalyzer. They are
displayed in the following locations:
l Dasboard > Alert Message Console widget
l System Settings > Event log pane
1. Go to System Settings > Event Log to view the local log list.
The recently generated management extension local logs are displayed in the Event Log pane.
You can check whether a new version of an enabled management extension application is available on the Fortinet
registry by using the CLI.
When the latest version of an enabled management extension application is running on FortiAnalyzer, the version is
reported as (up to date). When a new image is available on the Fortinet registry for an enabled management
extension application, the output displays (new image available).
In the example below, FortiSOAR MEA is enabled and a new version is available for installation. You can upgrade
FortiSOAR MEA by using the CLI.
This section identifies the request for comment (RFC) notes supported by FortiAnalyzer.
RFC 2548
Description:
Category:
Informational
Webpage:
http://tools.ietf.org/html/rfc2548
RFC 2665
Description:
Category:
Standards Track
Webpage:
http://tools.ietf.org/html/rfc2665
RFC 1918
Description:
Category:
Webpage:
http://tools.ietf.org/html/rfc1918
RFC 1213
Description:
Category:
FortiAnalyzer (SNMP)
Webpage:
http://tools.ietf.org/html/rfc1213
This section identifies the options for enabling log integrity and secure log transfer settings between FortiAnalyzer and
FortiGate devices.
Log Integrity
FortiAnalyzer can create an MD5 checksum for each log file in order to secure logs from being modified after they have
been sent to an analytics platform.
The log integrity setting selected determines the values recorded at the time of transmission or when rolling the log:
l MD5: Record the log file's MD5 hash value only.
l MD5-auth: Record the log file's MD5 hash value and authentication code.
l None: Do not record the log file checksum (default).
Verifying log-integrity
When log integrity settings are applied, you can view the MD5 checksum for logs in FortiAnalyzer event logs and the
FortiAnalyzer CLI.
1. Go to Incidents & Events > Event Monitor > All Events and select an event log.
2. In the toolbar, select Display Raw to view the raw log details.
The MD5 checksum is included in the details of the raw log.
id=6906469110439837696 itime=2020-12-18 06:47:59 euid=1 epid=1 dsteuid=1 dstepid=1
log_id=0031040026 subtype=logfile type=event level=information time=06:47:59
date=2020-12-18 user=system action=roll msg=Rolled log file tlog.1608270213.log
of device FGVM01TM20000000 [FGVM01TM20000000] vdom root, MD5 checksum:
ad85f8e889a3436d75b22b4a33c492ec userfrom=system desc=Rolling disk log file
devid=FAZVMSTM20000000 devname=FAZVMSTM20000000 dtime=2020-12-18 06:47:59 itime_
t=1608270479
Optimized Fabric Transfer Protocol (OFTP) is a proprietary Fortinet protocol. It is used for connectivity, performing
health checks, file transfers, and log display on FortiGate. OFTP listens on ports TCP514 and UDP514.
In the default configuration, there are two communication streams between FortiGate and FortiAnalyzer.
OFTP communication is encrypted and log communication is not.
l OFTP communication occurs on TCP514 using TLS.
l Log communication occurs on UDP514 (default setting).
To secure log transfer, you can enable TCP and encryption. When enabled, logs are transferred securely between the
FortiGate and FortiAnalyzer using TCP514 (TLS).
Reliable logging from FortiGate to FortiAnalyzer prevents lost logs when the connection between FortiGate and
FortiAnalyzer is disrupted. If connection is lost between the FortiAnalyzer and FortiGate device, logs will be cached and
sent to FortiAnalyzer once the connection resumes.
For more information, see FortiAnalyzer log caching in the FortiGate / FortiOS Administration Guide.
Enabling secure log transfer over TCP will impact overall logging performance.
OFTP SSL protocol supports SSLv3, TLSv1.0, TLSv1.2, and TLSv1.3 (default TLSv1.2).
When secure log transfer is enabled, log sync logic guarantees that no logs are lost due to connection issues between
the FortiGate and FortiAnalyzer. When connection is lost, logs will be cached and sent to FortiAnalyzer once the
connection resumes.
To confirm cached logs are sent when connection is lost/resumed between FortiGate and FortiAnalyzer:
3. When connection between the FortiGate and FortiAnalyzer is lost, check the log sequence number on the OFTP
connection.
In the FortiAnalyzer CLI, enter the following command:
diagnose test application oftpd 3
# DEVICE CONN HOSTNAME IP UPTIME IDLETIME #PKTS
--------------------------------------------------------------------------------------
--
1 FGT40FTK20025663 131071: 257 FortiGate-40F 10.3.169.1 35m14s 244s 620
While the connection is lost, logs generated on the FortiGate device will be stored in its memory queue. The log
squence number on the OFTP connection will not increase. In this example, the log sequence number has
remained at 257.
4. When the connection between the FortiGate and FortiAnalyzer devices resumes, check logs on the FortiGate
device.
In the FortiGate CLI, enter the following command:
diagnose test application fgtlogd 41
VDOM:root
Memory queue for: global-faz
queue:
num:0 size:0(0MB) total size:25788(0MB) max:100573388(95MB) logs:0
Confirm queue for: global-faz
queue:
num:25 size:17382(0MB) total size:25788(0MB) max:100573388(95MB) logs:81
Memory queue for: global-faz2
queue:
num:0 size:0(0MB) total size:25788(0MB) max:100573388(95MB) logs:0
Confirm queue for: global-faz2
queue:
num:12 size:8406(0MB) total size:25788(0MB) max:100573388(95MB) logs:40
The confirm queue on the FortiGate device shows all the logs that are waiting to be confirmed and cleared. Once
the confirm queue displays 0, all of the cached logs have been sent to the FortiAnalyzer device.
5. Once the logs have been confirmed and cleared from the FortiGate device, check the log sequence number on the
OFTP connection.
In the FortiAnalyzer CLI, enter the following command:
diagnose test application oftpd 3
# DEVICE CONN HOSTNAME IP UPTIME IDLETIME #PKTS
--------------------------------------------------------------------------------------
--
1 FGT40FTK20025663 131071: 308 FortiGate-40F 10.3.169.1 36m23s 6s 635
Once the cached logs have been sent to the FortiAnalyzer device, the log sequence number increases. In this
example, the log sequence number has increased to 308.
Supported ciphers
The list of supported ciphers is determined when configuring enc_algorithm using the configure log
fortianalyzer setting command in the FortiGate CLI.
FortiAnalyzer allows administrators to specify the security levels for cipher suites as low, medium, or high. Using a higher
security level means using more secure ciphers. SSL static key ciphers can be disabled to support forward secrecy.
Defining the enc-algorithm and ssl-static-key-ciphers usage settings in FortiAnalyzer allows administrators
to choose which OpenSSL cipher suites are supported.
l Low enc-algorithm uses all OpenSSL ciphers.
l Medium enc-algorithm uses high and medium OpenSSL ciphers.
l High enc-algorithm uses only high OpenSSL ciphers.
l Disabling ssl-static-key-ciphers enables forward secrecy.
If enc-algorithm is set to custom, configure the ssl-cipher-suites table to enforce the user specified preferred cipher
order in the incoming SSL connections. Enter the following command:
config system global
config ssl-cipher-suites
edit <priority>
set cipher <string>
set version {tls1.2-or-below | tls1.3}
end
If using enc-algorithm is set to high, medium, or low, see the list of supported ciphers based on security level
settings below.
ssl-static-key-ciphers enabled
enc-algorithm
Low TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_
128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-
AES256-GCM-SHA384:DHE-DSS-AES256-GCM-SHA384:DHE-RSA-AES256-
GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-
CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-
AES256-CCM:DHE-RSA-AES256-CCM:ECDHE-ECDSA-ARIA256-GCM-
SHA384:ECDHE-ARIA256-GCM-SHA384:DHE-DSS-ARIA256-GCM-
SHA384:DHE-RSA-ARIA256-GCM-SHA384:ECDHE-ECDSA-AES256-
SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:DHE-DSS-
AES256-SHA256:ECDHE-ECDSA-CAMELLIA256-SHA384:ECDHE-RSA-
CAMELLIA256-SHA384:DHE-RSA-CAMELLIA256-SHA256:DHE-DSS-
CAMELLIA256-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-
SHA:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DHE-RSA-CAMELLIA256-
SHA:DHE-DSS-CAMELLIA256-SHA:RSA-PSK-AES256-GCM-SHA384:DHE-PSK-
AES256-GCM-SHA384:RSA-PSK-CHACHA20-POLY1305:DHE-PSK-CHACHA20-
POLY1305:ECDHE-PSK-CHACHA20-POLY1305:DHE-PSK-AES256-CCM:RSA-
PSK-ARIA256-GCM-SHA384:DHE-PSK-ARIA256-GCM-SHA384:AES256-GCM-
SHA384:AES256-CCM:ARIA256-GCM-SHA384:PSK-AES256-GCM-SHA384:PSK-
CHACHA20-POLY1305:PSK-AES256-CCM:PSK-ARIA256-GCM-
SHA384:AES256-SHA256:CAMELLIA256-SHA256:ECDHE-PSK-AES256-CBC-
SHA384:ECDHE-PSK-AES256-CBC-SHA:SRP-DSS-AES-256-CBC-SHA:SRP-
RSA-AES-256-CBC-SHA:SRP-AES-256-CBC-SHA:RSA-PSK-AES256-CBC-
SHA384:DHE-PSK-AES256-CBC-SHA384:RSA-PSK-AES256-CBC-SHA:DHE-
PSK-AES256-CBC-SHA:ECDHE-PSK-CAMELLIA256-SHA384:RSA-PSK-
CAMELLIA256-SHA384:DHE-PSK-CAMELLIA256-SHA384:AES256-
SHA:CAMELLIA256-SHA:PSK-AES256-CBC-SHA384:PSK-AES256-CBC-
SHA:PSK-CAMELLIA256-SHA384:ECDHE-ECDSA-AES128-GCM-
SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-
SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-CCM:DHE-
RSA-AES128-CCM:ECDHE-ECDSA-ARIA128-GCM-SHA256:ECDHE-ARIA128-
GCM-SHA256:DHE-DSS-ARIA128-GCM-SHA256:DHE-RSA-ARIA128-GCM-
SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-
RSA-AES128-SHA256:DHE-DSS-AES128-SHA256:ECDHE-ECDSA-
CAMELLIA128-SHA256:ECDHE-RSA-CAMELLIA128-SHA256:DHE-RSA-
CAMELLIA128-SHA256:DHE-DSS-CAMELLIA128-SHA256:ECDHE-ECDSA-
AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:DHE-DSS-
AES128-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-DSS-CAMELLIA128-
SHA:RSA-PSK-AES128-GCM-SHA256:DHE-PSK-AES128-GCM-SHA256:DHE-
PSK-AES128-CCM:RSA-PSK-ARIA128-GCM-SHA256:DHE-PSK-ARIA128-GCM-
SHA256:AES128-GCM-SHA256:AES128-CCM:ARIA128-GCM-SHA256:PSK-
AES128-GCM-SHA256:PSK-AES128-CCM:PSK-ARIA128-GCM-SHA256:AES128-
SHA256:CAMELLIA128-SHA256:ECDHE-PSK-AES128-CBC-SHA256:ECDHE-
PSK-AES128-CBC-SHA:SRP-DSS-AES-128-CBC-SHA:SRP-RSA-AES-128-CBC-
SHA:SRP-AES-128-CBC-SHA:RSA-PSK-AES128-CBC-SHA256:DHE-PSK-
AES128-CBC-SHA256:RSA-PSK-AES128-CBC-SHA:DHE-PSK-AES128-CBC-
SHA:ECDHE-PSK-CAMELLIA128-SHA256:RSA-PSK-CAMELLIA128-
SHA256:DHE-PSK-CAMELLIA128-SHA256:AES128-SHA:CAMELLIA128-
SHA:PSK-AES128-CBC-SHA256:PSK-AES128-CBC-SHA:PSK-CAMELLIA128-
SHA256:ECDHE-ECDSA-AES256-CCM8:ECDHE-ECDSA-AES128-CCM8:DHE-
RSA-AES256-CCM8:DHE-RSA-AES128-CCM8:DHE-PSK-AES256-CCM8:DHE-
PSK-AES128-CCM8:AES256-CCM8:AES128-CCM8:PSK-AES256-CCM8:PSK-
AES128-CCM8
Medium TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_
128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-
AES256-GCM-SHA384:DHE-DSS-AES256-GCM-SHA384:DHE-RSA-AES256-
GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-
CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-
AES256-CCM:DHE-RSA-AES256-CCM:ECDHE-ECDSA-ARIA256-GCM-
SHA384:ECDHE-ARIA256-GCM-SHA384:DHE-DSS-ARIA256-GCM-
SHA384:DHE-RSA-ARIA256-GCM-SHA384:ECDHE-ECDSA-AES256-
SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:DHE-DSS-
AES256-SHA256:ECDHE-ECDSA-CAMELLIA256-SHA384:ECDHE-RSA-
CAMELLIA256-SHA384:DHE-RSA-CAMELLIA256-SHA256:DHE-DSS-
CAMELLIA256-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-
SHA:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DHE-RSA-CAMELLIA256-
SHA:DHE-DSS-CAMELLIA256-SHA:RSA-PSK-AES256-GCM-SHA384:DHE-PSK-
AES256-GCM-SHA384:RSA-PSK-CHACHA20-POLY1305:DHE-PSK-CHACHA20-
POLY1305:ECDHE-PSK-CHACHA20-POLY1305:DHE-PSK-AES256-CCM:RSA-
PSK-ARIA256-GCM-SHA384:DHE-PSK-ARIA256-GCM-SHA384:AES256-GCM-
SHA384:AES256-CCM:ARIA256-GCM-SHA384:PSK-AES256-GCM-SHA384:PSK-
CHACHA20-POLY1305:PSK-AES256-CCM:PSK-ARIA256-GCM-
SHA384:AES256-SHA256:CAMELLIA256-SHA256:ECDHE-PSK-AES256-CBC-
SHA384:ECDHE-PSK-AES256-CBC-SHA:SRP-DSS-AES-256-CBC-SHA:SRP-
RSA-AES-256-CBC-SHA:SRP-AES-256-CBC-SHA:RSA-PSK-AES256-CBC-
SHA384:DHE-PSK-AES256-CBC-SHA384:RSA-PSK-AES256-CBC-SHA:DHE-
PSK-AES256-CBC-SHA:ECDHE-PSK-CAMELLIA256-SHA384:RSA-PSK-
CAMELLIA256-SHA384:DHE-PSK-CAMELLIA256-SHA384:AES256-
SHA:CAMELLIA256-SHA:PSK-AES256-CBC-SHA384:PSK-AES256-CBC-
SHA:PSK-CAMELLIA256-SHA384:ECDHE-ECDSA-AES128-GCM-
SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-
SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-CCM:DHE-
RSA-AES128-CCM:ECDHE-ECDSA-ARIA128-GCM-SHA256:ECDHE-ARIA128-
GCM-SHA256:DHE-DSS-ARIA128-GCM-SHA256:DHE-RSA-ARIA128-GCM-
SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-
RSA-AES128-SHA256:DHE-DSS-AES128-SHA256:ECDHE-ECDSA-
CAMELLIA128-SHA256:ECDHE-RSA-CAMELLIA128-SHA256:DHE-RSA-
CAMELLIA128-SHA256:DHE-DSS-CAMELLIA128-SHA256:ECDHE-ECDSA-
AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:DHE-DSS-
AES128-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-DSS-CAMELLIA128-
SHA:RSA-PSK-AES128-GCM-SHA256:DHE-PSK-AES128-GCM-SHA256:DHE-
PSK-AES128-CCM:RSA-PSK-ARIA128-GCM-SHA256:DHE-PSK-ARIA128-GCM-
SHA256:AES128-GCM-SHA256:AES128-CCM:ARIA128-GCM-SHA256:PSK-
AES128-GCM-SHA256:PSK-AES128-CCM:PSK-ARIA128-GCM-SHA256:AES128-
SHA256:CAMELLIA128-SHA256:ECDHE-PSK-AES128-CBC-SHA256:ECDHE-
PSK-AES128-CBC-SHA:SRP-DSS-AES-128-CBC-SHA:SRP-RSA-AES-128-CBC-
SHA:SRP-AES-128-CBC-SHA:RSA-PSK-AES128-CBC-SHA256:DHE-PSK-
AES128-CBC-SHA256:RSA-PSK-AES128-CBC-SHA:DHE-PSK-AES128-CBC-
SHA:ECDHE-PSK-CAMELLIA128-SHA256:RSA-PSK-CAMELLIA128-
SHA256:DHE-PSK-CAMELLIA128-SHA256:AES128-SHA:CAMELLIA128-
SHA:PSK-AES128-CBC-SHA256:PSK-AES128-CBC-SHA:PSK-CAMELLIA128-
SHA256:ECDHE-ECDSA-AES256-CCM8:ECDHE-ECDSA-AES128-CCM8:DHE-
RSA-AES256-CCM8:DHE-RSA-AES128-CCM8:DHE-PSK-AES256-CCM8:DHE-
PSK-AES128-CCM8:AES256-CCM8:AES128-CCM8:PSK-AES256-CCM8:PSK-
AES128-CCM8
High TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_
128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-
AES256-GCM-SHA384:DHE-DSS-AES256-GCM-SHA384:DHE-RSA-AES256-
GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-
CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-
AES256-CCM:DHE-RSA-AES256-CCM:ECDHE-ECDSA-ARIA256-GCM-
SHA384:ECDHE-ARIA256-GCM-SHA384:DHE-DSS-ARIA256-GCM-
SHA384:DHE-RSA-ARIA256-GCM-SHA384:ECDHE-ECDSA-AES256-
SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:DHE-DSS-
AES256-SHA256:ECDHE-ECDSA-CAMELLIA256-SHA384:ECDHE-RSA-
CAMELLIA256-SHA384:DHE-RSA-CAMELLIA256-SHA256:DHE-DSS-
CAMELLIA256-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-
SHA:DHE-RSA-AES256-SHA:DHE-DSS-AES256-SHA:DHE-RSA-CAMELLIA256-
SHA:DHE-DSS-CAMELLIA256-SHA:RSA-PSK-AES256-GCM-SHA384:DHE-PSK-
AES256-GCM-SHA384:RSA-PSK-CHACHA20-POLY1305:DHE-PSK-CHACHA20-
POLY1305:ECDHE-PSK-CHACHA20-POLY1305:DHE-PSK-AES256-CCM:RSA-
PSK-ARIA256-GCM-SHA384:DHE-PSK-ARIA256-GCM-SHA384:AES256-GCM-
SHA384:AES256-CCM:ARIA256-GCM-SHA384:PSK-AES256-GCM-SHA384:PSK-
CHACHA20-POLY1305:PSK-AES256-CCM:PSK-ARIA256-GCM-
SHA384:AES256-SHA256:CAMELLIA256-SHA256:ECDHE-PSK-AES256-CBC-
SHA384:ECDHE-PSK-AES256-CBC-SHA:SRP-DSS-AES-256-CBC-SHA:SRP-
RSA-AES-256-CBC-SHA:SRP-AES-256-CBC-SHA:RSA-PSK-AES256-CBC-
SHA384:DHE-PSK-AES256-CBC-SHA384:RSA-PSK-AES256-CBC-SHA:DHE-
PSK-AES256-CBC-SHA:ECDHE-PSK-CAMELLIA256-SHA384:RSA-PSK-
CAMELLIA256-SHA384:DHE-PSK-CAMELLIA256-SHA384:AES256-
SHA:CAMELLIA256-SHA:PSK-AES256-CBC-SHA384:PSK-AES256-CBC-
SHA:PSK-CAMELLIA256-SHA384:ECDHE-ECDSA-AES128-GCM-
SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-
SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-CCM:DHE-
RSA-AES128-CCM:ECDHE-ECDSA-ARIA128-GCM-SHA256:ECDHE-ARIA128-
GCM-SHA256:DHE-DSS-ARIA128-GCM-SHA256:DHE-RSA-ARIA128-GCM-
SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-
RSA-AES128-SHA256:DHE-DSS-AES128-SHA256:ECDHE-ECDSA-
CAMELLIA128-SHA256:ECDHE-RSA-CAMELLIA128-SHA256:DHE-RSA-
CAMELLIA128-SHA256:DHE-DSS-CAMELLIA128-SHA256:ECDHE-ECDSA-
AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:DHE-DSS-
AES128-SHA:DHE-RSA-CAMELLIA128-SHA:DHE-DSS-CAMELLIA128-
SHA:RSA-PSK-AES128-GCM-SHA256:DHE-PSK-AES128-GCM-SHA256:DHE-
PSK-AES128-CCM:RSA-PSK-ARIA128-GCM-SHA256:DHE-PSK-ARIA128-GCM-
SHA256:AES128-GCM-SHA256:AES128-CCM:ARIA128-GCM-SHA256:PSK-
AES128-GCM-SHA256:PSK-AES128-CCM:PSK-ARIA128-GCM-SHA256:AES128-
SHA256:CAMELLIA128-SHA256:ECDHE-PSK-AES128-CBC-SHA256:ECDHE-
PSK-AES128-CBC-SHA:SRP-DSS-AES-128-CBC-SHA:SRP-RSA-AES-128-CBC-
SHA:SRP-AES-128-CBC-SHA:RSA-PSK-AES128-CBC-SHA256:DHE-PSK-
AES128-CBC-SHA256:RSA-PSK-AES128-CBC-SHA:DHE-PSK-AES128-CBC-
SHA:ECDHE-PSK-CAMELLIA128-SHA256:RSA-PSK-CAMELLIA128-
SHA256:DHE-PSK-CAMELLIA128-SHA256:AES128-SHA:CAMELLIA128-
SHA:PSK-AES128-CBC-SHA256:PSK-AES128-CBC-SHA:PSK-CAMELLIA128-
SHA256
The following ciphers are not available when using forward secrecy (ssl-static-key-ciphers is disabled).
ssl-static-key-ciphers disabled
enc-algorithm
Low AES256-GCM-SHA384:AES256-CCM:ARIA256-GCM-SHA384:AES256-
SHA256:CAMELLIA256-SHA256:AES256-SHA:CAMELLIA256-SHA:AES128-
GCM-SHA256:AES128-CCM:AES128-SHA256:CAMELLIA128-SHA256:AES128-
SHA:CAMELLIA128-SHA:AES256-CCM8:AES128-CCM8
Medium AES256-GCM-SHA384:AES256-CCM:ARIA256-GCM-SHA384:AES256-
SHA256:CAMELLIA256-SHA256:AES256-SHA:CAMELLIA256-SHA:AES128-
GCM-SHA256:AES128-CCM:AES128-SHA256:CAMELLIA128-SHA256:AES128-
SHA:CAMELLIA128-SHA:AES256-CCM8:AES128-CCM8
High AES256-GCM-SHA384:AES256-CCM:ARIA256-GCM-SHA384:AES256-
SHA256:CAMELLIA256-SHA256:AES256-SHA:CAMELLIA256-SHA:AES128-
GCM-SHA256:AES128-CCM:AES128-SHA256:CAMELLIA128-SHA256:AES128-
SHA:CAMELLIA128-SHA
The tables below indicate the maximum supported TLS version that you can configure for communication between a
FortiGate and FortiAnalyzer, as well as FortiAnalyzer's configured with log forwarding when the type is FortiAnalyzer.
For more information on secure log transfer and log integrity settings between FortiGate and FortiAnalyzer, see
Appendix B - Log Integrity and Secure Log Transfer on page 474.
Documentation for the Fortinet FortiAnalyzer Ansible Collection is available through the link below.
l FortiAnalyzer Ansible Collection documentation
The monthly token allocation for the FortiAI license varies by FortiAnalyzer platform.
For information about FortiAI tokens, see FortiAI tokens on page 285.
FortiAnalyzer-150G 1000000
FortiAnalyzer-300G 2249862
FortiAnalyzer-810G 5440628
FortiAnalyzer-1000G 7498984
FortiAnalyzer-3510G 26532226
FortiAnalyzer-3700G 35041552
FC1-10-AZVMS-1118-01-DD 5 105128
FC2-10-AZVMS-1118-01-DD 50 759280
FC2-10-LV0VM-1118-02-DD 1 - 11 420498
FC3-10-LV0VM-1118-02-DD 1 - 26 1518560
Copyright© 2024 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.