FortiAnalyzer 5.4.1 Administration Guide
FortiAnalyzer 5.4.1 Administration Guide
VERSION5.4.1
FORTINET DOCUMENTLIBRARY
http://docs.fortinet.com
FORTINETVIDEOGUIDE
http://video.fortinet.com
FORTINETBLOG
https://blog.fortinet.com
CUSTOMERSERVICE&SUPPORT
https://support.fortinet.com
FORTIGATECOOKBOOK
http://cookbook.fortinet.com
FORTINETTRAININGSERVICES
http://www.fortinet.com/training
FORTIGUARDCENTER
http://www.fortiguard.com
ENDUSER LICENSE AGREEMENT
http://www.fortinet.com/doc/legal/EULA.pdf
FEEDBACK
Email: [email protected]
TABLEOFCONTENTS
Change Log
Introduction
FortiAnalyzer documentation
Key Concepts
Two operation modes
Analyzer mode
Collector mode
Analyzer and Collector:Feature comparison
AnalyzerCollector collaboration
Administrative domains
Log storage
SQLdatabase
Archive logs and Analytics logs
Data policy and automatic deletion
Disk utilization for compressed and Analytics logs
FortiAnalyzer GUI
12
13
13
14
14
14
14
15
15
15
15
15
16
16
16
17
17
17
17
17
17
18
18
18
18
19
19
19
20
20
20
20
21
22
Getting started
Target audience and access level
Initial Setup
Configuring AnalyzerCollector collaboration
Configuring the Collector
Configuring the Analyzer
Fetching logs from the Collector to the Analyzer
Next steps
Network
About the network
Ports
Administrative access
Restrict administrator access with trusted hosts
Configuring the network
Configuring ports and administrator access
Adding a static route
Managing the network
Viewing network settings
Editing network settings
Changing administrative access
Disabling ports
Network references
Network pane
Create New Network Route pane
Edit System Interface pane
RAID
About RAID
Supported RAID levels
RAID support per FortiAnalyzer model
Configuring RAID
Managing RAID
Monitoring RAIDstatus
Swapping hard disks
Adding new disks
RAID references
RAID Management pane
22
22
24
25
25
25
27
27
27
28
28
29
30
30
31
31
31
31
31
31
31
32
32
32
33
33
33
33
33
34
34
36
36
36
38
39
39
40
40
41
41
41
Administrative Domains
About ADOMs
How ADOMs affect the GUI
Default ADOMs
FortiClient support and ADOMs
Considerations for creating ADOMs
ADOM device modes and VDOM support
Configuring ADOMs
Enabling ADOMs
Enabling advanced ADOM device mode
Creating ADOMs
Assigning devices to ADOMs
Assigning administrators to ADOMs
Managing ADOMs
Viewing all ADOMs
Disabling advanced ADOMmode
Disabling ADOMs
ADOM references
Administrator Accounts
About administrator accounts
Administrator accounts
How ADOMs affect administrator access
Trusted hosts
Administrator profiles
Configuring administrator accounts
Managing administrator accounts
Viewing administrator accounts
Viewing administrators logged into the FortiAnalyzer unit
Disconnecting administrators from the FortiAnalyzer unit
Administrator profiles
Managing administrator profiles
Creating custom administrator profiles
Remote authentication servers
Managing remote authentication servers
Adding an LDAP server
Adding a RADIUS server
Adding a TACACS+ server
Two-factor authentication
Configuring FortiAuthenticator
Configuring FortiAnalyzer
Admin settings
Configuring administration settings
43
43
43
43
44
44
44
44
44
45
45
47
47
47
48
48
49
50
51
51
51
51
51
52
53
54
54
54
55
55
55
55
56
56
56
58
58
59
59
62
63
63
Devices
About devices
How ADOMs affect devices
FortiClient EMS devices
Unregistered devices
The quick status bar
Displaying historical average log rates
Connecting to a registered device GUI
Adding devices
Adding devices using the wizard
Adding devices manually
Device references
Device Manager >Devices Total pane
Device Manager >Unregistered Devices pane
Add Device wizard
Edit Device pane
FortiView
64
64
64
65
65
66
66
68
68
68
68
68
68
69
69
69
70
71
71
71
72
73
73
75
75
75
75
76
76
77
78
79
79
80
81
82
82
83
83
84
85
88
About FortiView
How ADOMs affect the FortiView pane
Logs used for FortiView
FortiView summary list and description
Using FortiView
Viewing FortiView summary page
Viewing FortiView summaries in tabular format
Viewing FortiView summaries in graphical format
Filtering FortiView summaries
Viewing related logs
Exporting filtered summaries to PDF
Exporting filtered summaries to report charts
Viewing end users' Indicators of Compromise (IOC) information
Monitoring resource usage of devices
Examples of using FortiView
Finding application and user information
Finding unsecured wireless access points
Analyzing and reporting on network traffic
Log View
About Log View
How ADOMs affect the Log View tab
Logs used for Log View
Types of logs collected for each device
Log messages
Viewing the log message list of a specific log type
Viewing log message details
Customizing displayed columns
Filtering log messages
Viewing historical and real-time logs
Viewing raw and formatted logs
Custom views
Downloading log messages
Creating charts with Chart Builder
Log groups
Creating log groups
Log Browse
Browsing log files
Importing a log file
Downloading a log file
Log View references
Chart Builder dialog box
Event Monitor
88
88
88
88
91
91
93
93
95
95
96
96
96
97
97
97
98
98
99
99
99
99
99
101
101
101
102
102
104
105
105
106
106
106
107
107
107
107
108
108
108
110
About events
How ADOMs affect events
Predefined event handlers
Logs used for events
Event handlers
Enabling event handlers
Creating custom event handlers
Filtering event handlers by predefined and custom
Searching event handlers
Resetting predefined event handlers to factory defaults
Managing event handlers
Events
Viewing event summaries
Viewing event details
Acknowledging events
Event references
List of predefined event handlers
Create New Handler pane
Reports
About reports
How ADOMs affect reports
Predefined reports, templates, charts, and macros
Logs used for reports
How charts and macros extract data from logs
How auto-cache works
Generating reports
Generating reports
Viewing completed reports
Enabling auto-cache
Grouping reports
Retrieving report generation logs
Scheduling reports
Creating reports
Creating reports from report templates
Creating reports by cloning and editing
Creating reports without using a template
Customizing report cover pages
Managing reports
Organizing reports into folders
Importing and exporting reports
Report template library
Creating report templates
110
110
110
110
110
111
111
112
112
112
113
113
114
114
115
115
115
118
121
121
121
121
122
122
122
123
123
123
123
123
124
124
125
125
125
126
126
128
128
129
129
129
System Settings
System settings tree menu
System settings dashboard
Customizing the dashboard
Configuring operation modes
Viewing and updating FortiAnalyzer firmware
Viewing license information
Uploading a FortiAnalyzer VMlicense
Enabling FortiAnalyzer to manage a small number of FortiGate devices
Viewing port status
Viewing CPUstatus
Viewing alert messages
Viewing the number of logs being received
Setting the date and time
Changing the host name
130
130
130
131
131
134
135
135
136
136
136
137
138
138
138
140
140
140
140
141
141
141
142
142
142
144
146
151
151
152
154
155
155
155
156
156
157
157
158
158
158
159
160
160
160
161
162
162
162
162
163
163
163
163
164
164
164
164
164
165
167
167
167
170
173
173
174
174
174
175
175
176
178
179
180
181
182
182
183
183
183
183
184
184
Downloading WSDLfiles
System configuration backups
Backing up the system configuration
Restoring the system configuration
185
185
185
186
187
Change Log
Change Log
12
Date
Change Description
2016-06-29
Initial release
2016-07-05
2016-07-11
2016-07-29
Administration Guide
Fortinet Technologies Inc.
Introduction
FortiAnalyzer platforms integrate network logging, analysis, and reporting into a single system, delivering
increased knowledge of security events throughout your network. The FortiAnalyzer family minimizes the effort
required to monitor and maintain acceptable use policies, as well as identifies attack patterns to help you finetune your policies. Organizations of any size will benefit from centralized security event logging, forensic
research, reporting, content archiving, data mining and malicious file quarantining.
FortiAnalyzer offers enterprise class features to identify threats, while providing the flexibility to evolve along with
your ever-changing network. FortiAnalyzer can generate highly customized reports for your business
requirements, while aggregating logs in a hierarchical, tiered logging topology.
You can deploy FortiAnalyzer physical or virtual appliances to collect, correlate, and analyze geographically and
chronologically diverse security data. Alerts and log information from Fortinet appliances and third-party devices
are aggregated in a single location, providing a simplified, consolidated view of your security posture. In addition,
FortiAnalyzer platforms provide detailed data capture for forensic purposes to comply with policies regarding
privacy and disclosure of information security breaches.
FortiAnalyzer documentation
The following FortiAnalyzer product documentation is available:
l
Administration Guide
Fortinet Technologies Inc.
13
FortiAnalyzer 5.4.1
FortiAnalyzer 5.4.1 includes the following new features and enhancements.
FortiView
Export a FortiView Summary to Chart
You can export a filtered FortiView summary, or any level of its drilldowns, to a custom chart. This new chart is
saved in the chart library and can be inserted into reports. See Exporting filtered summaries to report charts on
page 96.
JSONAPI Support
An extension of the JSON API allows remote systems to query and retrieve FortiView data.
Performance Optimization
FortiView performance is optimized with the addition of intelligent summaries and caching.
14
Administration Guide
Fortinet Technologies Inc.
FortiAnalyzer 5.4.0
Reports
FortiClient Vulnerability Scan Report
FortiAnalyzer supports the new FortiClient 5.4.1 Vulnerability Scan feature by including a new "FortiClient
Vulnerability Scan Report" report template, which summarizes all the FortiClient endpoints in the network, plus
their installed applications and any vulnerabilities. See List of report templates on page 142.
Log Forwarding
Field Exclusion
You can now control which log fields to include when you forward logs to a remote Syslog or CEF server. See
Configuring log forwarding on page 165.
Log Fetching
Log fetching is a new feature in FortiAnalyzer 5.4. It enables you to run queries or reports against historical
(archived) database for forensic analysis. The fetch client queries the remote FortiAnalyzer fetch server and
retrieves the needed data. FortiAnalyzer 5.4.1 includes usability improvements for the setup and authentication
between fetch client and server. See Log fetcher management on page 167.
Log View
Log Details in Tree View
Log fields in the details pane are now grouped in tree view for better readability. See Viewing log message details
on page 101.
Case-Insensitive Search
Search in Log View is now case-insensitive by default. See Filtering log messages on page 102.
FortiAnalyzer 5.4.0
FortiAnalyzer 5.4.0 includes the following new features and enhancements.
Administration Guide
Fortinet Technologies Inc.
15
FortiAnalyzer 5.4.0
New GUI
The FortiAnalyzer GUI has a new look and simplified navigation. When ADOMs are enabled, you now select an
ADOM when you log into FortiAnalyzer. After you log in, you can choose which pane to display by choosing one of
the following options: Device Manager, FortiView , Log View , Event Monitor, Reports, and System Settings.
You can use the banner at the top of the FortiAnalyzer GUI to switch between ADOMs and panes. See GUI
overview on page 22.
FortiView extensions
FortiView includes new summary views as well as more graphical display options. You can also print summary
views and detailed views to PDF.
New summary views:
l
Authorized SSIDs
WiFi Clients
Report extensions
FortiAnalyzer includes the new reports, report templates, and charts. See Reports on page 121.
New reports:
l
New charts:
l
A new chart builder is also available on the Log View pane to help you build charts based on the logs that you are
viewing. See Creating charts with Chart Builder on page 106.
16
Administration Guide
Fortinet Technologies Inc.
FortiAnalyzer 5.4.0
Fetching
You can fetch offline, Archive logs from one FortiAnalyzer unit to a second FortiAnalyzer unit where the logs can
be automatically indexed in the database to support data analysis on the Log View , FortiView , and Reports tabs.
The fetch feature allows you to analyze data from Archive logs without affecting the performance of the primary
FortiAnalyzer unit because the process of fetching logs happens in the background. See Log fetcher
management on page 167.
Administration Guide
Fortinet Technologies Inc.
17
Key Concepts
This chapter defines basic FortiAnalyzer concepts and terms. If you are new to FortiAnalyzer, this chapter can
help you to quickly understand this document and your FortiAnalyzer platform.
Analyzer mode
The Analyzer mode is the default mode that supports all FortiAnalyzer features, such as FortiView , Event
Monitor, and Reports. You can use this mode to aggregate logs from one or more Collectors.
The following diagram illustrates an example of deploying a FortiAnalyzer unit in Analyzer mode.
Collector mode
When a FortiAnalyzer is configured to work in the Collector mode, its primary task becomes forwarding logs of the
connected devices to an Analyzer and archiving the logs. Instead of writing logs to the database, the Collector
retains the logs in their original (binary) format for uploading. In this mode, most features, including FortiView,
Event Monitor, and Reports, are disabled.
18
Administration Guide
Fortinet Technologies Inc.
Administrative domains
Key Concepts
Analyzer Mode
Collector Mode
Event Management
Yes
No
Monitoring devices
Yes
No
Reporting
Yes
No
FortiView/Log View
Yes
No
Device Manager
Yes
Yes
System Settings
Yes
Yes
Log Forwarding
Yes
Yes
AnalyzerCollector collaboration
You can deploy the Analyzer mode and Collector mode on different FortiAnalyzer units and make the units work
together to improve the overall performance of log receiving, analysis, and reporting. The Collector offloads the
log receiving task from the Analyzer so that the Analyzer can focus on data analysis and report generation. Since
collecting logs from the connected devices is the dedicated task of the Collector, its log receiving performance is
maximized.
For an example of setting up AnalyzerCollector collaboration, see Configuring AnalyzerCollector collaboration
on page 28.
Administrative domains
Administrative domains (ADOMs) enable the admin administrator to constrain the access privileges of other
FortiAnalyzer unit administrators to a subset of devices in the device list. For Fortinet devices with virtual domains
(VDOMs), ADOMs can further restrict access to only data from a specific VDOM for a device.
Enabling ADOMs alters the available functions in the GUI and CLI. Access to the functions depends on whether
you are logged in as the admin administrator. If you are logged in as the admin administrator, you can access
all ADOMs. If you are not logged in as the admin administrator, access to ADOMs is determined by the settings
in your administrator account.
For information on enabling and disabling ADOMs, see Enabling ADOMs on page 44. For information on working
with ADOMs, see Administrative Domains on page 43. For information on configuring administrator accounts,
See Administrator Accounts on page 51.
ADOMs must be enabled to support FortiCarrier, FortiClient EMS, FortiMail,
FortiWeb, FortiCache, and FortiSandbox logging and reporting. See Administrative
Domains on page 43.
Administration Guide
Fortinet Technologies Inc.
19
Key Concepts
Log storage
Log storage
FortiAnalyzer stores logs from managed devices on the FortiAnalyzer disks and in an SQLdatabase. You can
control how much storage space to use for logs and how long to store logs.
SQLdatabase
The FortiAnalyzer unit supports Structured Query Language (SQL) for logging and reporting. The log data is
inserted into the SQL database to support data analysis on the FortiView pane, Log View pane, and Reports
pane. Remote SQL databases are not supported.
For more information, see FortiView on page 88, Log View on page 99, and Reports on page 121.
The log storage settings define how much FortiAnalyzer disk space to use for the SQLdatabase. See Log storage
on page 20.
The SQLdatabase is disabled by default when the FortiAnalyzer unit is operating in
collector mode. See Two operation modes on page 18.
During the compressed phase, logs are compressed and stored on the FortiAnalyzer disks for a specified amount
of time for the purpose of retention. While logs are compressed, they are considered offline, and you cannot view
details about the logs on the FortiView pane or the Log View pane. You also cannot generate reports about the
logs on the Reports pane.
During the indexed phase, logs are indexed in the SQLdatabase for a specified amount of time for the purpose of
analysis. While logs are indexed in the SQLdatabase, they are considered online, and you can view details about
the logs on the FortiView pane and the Log View pane. You can also generate reports about the logs on the
Reports pane.
You can control how long to retain Archive logs and how long to keep Analytics logs in the database by using a
data policy.
20
Administration Guide
Fortinet Technologies Inc.
Log storage
Key Concepts
Administration Guide
Fortinet Technologies Inc.
21
FortiAnalyzer GUI
You can use the GUIto configure most FortiAnalyzer settings, such as the date, time, and the host name. You
can also use the GUIto reboot and shut down the FortiAnalyzer unit.
IP address: 192.168.1.X
Netmask: 255.255.255.0
3. On the management computer, start a supported web browser and browse to https://192.168.1.99.
4. Type admin in the User Name field, leave the Password field blank, and click Login.
5. If ADOMs are enabled, the Select an ADOM pane is displayed. Click an ADOM to select it.
The home page of tiles is displayed.
6. Click a tile to go to that pane.
If the network interfaces have been configured differently during installation, the URL
and/or permitted administrative access protocols (such as HTTPS) may no longer be in
their default state.
For information on enabling administrative access protocols and configuring IP addresses, see Configuring ports
and administrator access on page 31.
If the URL is correct and you still cannot access the GUI, you may also need to configure static routes. For details, see Adding a static route on page 32.
After logging in for the first time, you should create an administrator account for yourself and assign the Super_
User profile to it. Then you should log into the FortiAnalyzer unit by using the new administrator account. See
Configuring administrator accounts on page 53.
GUI overview
When you log into the FortiAnalyzer GUI, the following home page of tiles is displayed:
22
Administration Guide
Fortinet Technologies Inc.
GUI overview
FortiAnalyzer GUI
Select one of the following tiles to display the respective pane. The available tiles will vary depending on the
privileges of the current user.
Device Manager
Add and manage devices and VDOMs. See Devices on page 68.
FortiView
View summaries of log data in graphical formats. For example, you can
view top threats to your network, top sources of network traffic, top destinations of network traffic and so on.
For each summary view, you can drill down into details for the event. See
FortiView on page 88.
This pane is not available when the unit is in Collector mode. See Two operation modes on page 18
Log View
View logs for managed devices. You can display, download, import, and
delete logs on this page. You can also define custom views and create log
groups. See Log View on page 99.
This pane is not available when the unit is in Collector mode. See Two operation modes on page 18
Event Monitor
Configure and view events for managed log devices.See Event Monitor on
page 110.
This pane is not available when the unit is in Collector mode. See Two operation modes on page 18
Reports
Generate reports. You can also configure report templates, schedules, and
output profiles, and manage charts and datasets. See Reports on page
121.
This pane is not available when the unit is in Collector mode. See Two operation modes on page 18
System Settings
Configure system settings, such as network interfaces, administrators, system time, server settings, and others. You can also perform maintenance
and firmware operations. See System Settings on page 151.
The top-right corner of the home page includes an admin menu, as well as a Notification button, and a Help
button.
Administration Guide
Fortinet Technologies Inc.
23
FortiAnalyzer GUI
GUI overview
Admin
Notification
Click to display a list of notifications. Select a notification from the list to take action on
the issue.
Help
Click to open the FortiAnalyzer online help or view the About information for your
device (Product, Version, and Build Number).
Panes
In general, panes have four primary parts: the banner, toolbar, tree menu, and content pane.
Banner
Along the top of the page; includes the home button (Fortinet logo), tile menu, ADOM
menu (when enabled), admin menu, notifications, and help button.
Tree menu
On the left side of the screen; includes the menus for the selected pane. Not available
in Device Manager.
Content pane
Toolbar
Directly above the content pane; includes options for managing content in the content
pane, such as Create New and Delete.
To switch between panes, either select the home button to return to the home page, or select the tile menu then
select a new tile.
24
Administration Guide
Fortinet Technologies Inc.
FortiAnalyzer GUI
ADOMaccess is controlled by administrator accounts and the profile assigned to the administrator account.
Depending on your account privileges, you might not have access to all ADOMs. See also Administrator Accounts
on page 51.
Administration Guide
Fortinet Technologies Inc.
25
FortiAnalyzer GUI
2. Select y to continue. The device will reset to factory default settings and reboot.
26
Administration Guide
Fortinet Technologies Inc.
Getting started
Getting started
This chapter provides information about performing some basic setups for your FortiAnalyzer units.
Initial Setup
This topic provides an overview of the tasks that you need to do to get your FortiAnalyzer unit up and running.
To set up FortiAnalyzer:
1. Connect to the GUI. See Connecting to the GUI on page 22.
2. Configure the RAID level, if the FortiAnalyzer unit supports RAID. See Configuring RAID on page 39.
3. Configure network settings. See Configuring ports and administrator access on page 31.
Once the IP address of the administrative port of FortiAnalyzer is changed, you
will lose connection to FortiAnalyzer. You will have to reconfigure the IP
address of the management computer to connect again to FortiAnalyzer and
continue.
4. (Optional) Configure administrative domains. See Configuring ADOMs on page 44.
5. Configure administrator accounts. See Configuring administrator accounts on page 53.
After you configure the administrator accounts for the FortiAnalyzer unit, you
should log in again by using your new administrator account.
6. Add devices to the FortiAnalyzer unit so that the devices can send logs to the FortiAnalyzer unit. See Adding
devices on page 69.
7. Configure the operation mode. See Configuring operation modes on page 155 and Two operation modes on page
18.
Administration Guide
Fortinet Technologies Inc.
27
Getting started
For the related concepts, see Two operation modes on page 18 and AnalyzerCollector collaboration on page 19.
You need to complete the initial setup for your FortiAnalyzer units first. See "Initial Setup" on page 27.
28
Administration Guide
Fortinet Technologies Inc.
Getting started
3. Set up log forwarding to enable the Collector to forward the logs to the Analyzer. See Log Forwarding on page
164. In particular,
l
Set Remote Server Type to FortiAnalyzer.
l
Set Server IP to the IP address of the Analyzer that this Collector will forward logs to.
Click Select Device and select the FortiGate device that the Collector will forward logs for.
Per the default setting, the Collector will forward logs in real time to the
Analyzer. If you want the Collector to upload content files, which include DLP
(data leak prevention) files, antivirus quarantine files, and IPS (intrusion
prevention system) packet captures, you should set the log forwarding mode to
Both so that the Collector will also send content files to the Analyzer daily at the
scheduled time. See Configuring log forwarding mode in CLI on page 165.
Administration Guide
Fortinet Technologies Inc.
29
Getting started
Next steps
3. Make sure that the aggregation service is enabled on the Analyzer. If not, use this CLIcommand to enable it:
config system aggregation-service
set accept-aggregation enable
end
4. Add the FortiGate device of the remote office that the Collector will forward logs for. See Adding devices manually
on page 71.
Once the FortiGate of the remote office is added, the Analyzer starts receiving its logs from the Collector.
Next steps
Now that you have set up your FortiAnalyzer units and they have started receiving logs from the devices, you can
start monitoring and interpret data. You can:
30
View log messages collected by the FortiAnalyzer unit in Log View . See Log View on page 99.
View summaries of threats, traffic, and more in FortiView . See FortiView on page 88
Generate and view events in Event Monitor. See Event Monitor on page 110.
Administration Guide
Fortinet Technologies Inc.
Network
About the network
The network settings are used to configure one or more ports for the FortiAnalyzer unit. You should also specify
what port and methods that administrators can use to access the FortiAnalyzer unit. You can also configure
statics routes if required.
Ports
The default port for FortiAnalyzer units is port1. You can use port1 to configure one IPaddress for the
FortiAnalyzer unit, or you can use multiple ports to configure multiple IPaddresses for better security.
Administrative access
The default configuration allows administrative access to one or more of the ports for the FortiAnalyzer unit as
described in the QuickStart and installation guides for your device.
You can configure administrative access in IPv4 or IPv6 and include settings for HTTPS, HTTP, PING, SSH
(Secure Shell), TELNET, SNMP, Web Service, and FortiManager.
Use port1 for device log traffic, and disable unneeded services for port1, such as SSH, TELNET, Web Service, and
so on.
Use a second port for administrator access, and enable HTTPs, Web Service, and SSH for this port. Leave other
services disabled.
The DNS servers must be on the networks to which the FortiAnalyzer unit connects and should have two different
IPaddresses.
Administration Guide
Fortinet Technologies Inc.
31
Network
32
Administration Guide
Fortinet Technologies Inc.
Network references
Network
To view the Network settings, go to System Settings> Network, and click All Interfaces, Routing Table, or IPv6
Routing Table.
Disabling ports
You can enable and disable ports. When a port is enabled, it accepts network traffic. When a port is disabled, no
network traffic is accepted.
To disable ports:
1. Go to System Settings> Network.
2. Click All Interfaces.
3. Select a port, then click Edit.
4. Beside Status, click the Disable button, then click OK.
Network references
Network pane
Following is a description of the fields on the System Settings > Network pane when creating an interface.
Administration Guide
Fortinet Technologies Inc.
33
Network
Network references
Field
Description
IP Address/Netmask
IPv6 Address
Administrative Access
Default Gateway
All Interfaces
Routing Table
Field
Description
Type the destination IP address and netmask or IPv6 prefix for this route.
Gateway
Type the address of the next hop router to which this route directs traffic.
Interface
34
Field
Description
Name
Alias
IP Address/Netmask
Administration Guide
Fortinet Technologies Inc.
Network references
Network
Field
Description
IPv6 Address
Administrative Access
Select the services to allow on this interface. Any interface that is used to
provide administration access to the FortiAnalyzer unit will require at least
HTTPS or HTTP for GUI access, or SSH for CLI access.
Select the services to allow on this interface. Any interface that is used to
provide administration access to the FortiAnalyzer unit will require at least
HTTPS or HTTP for GUI access, or SSH for CLI access.
Service Access
Status
Enable or disable the interface. Click Enable to enable the interface and
allow the interface to accept network traffic. Click Disable to disable the
interface.
Administration Guide
Fortinet Technologies Inc.
35
RAID
About RAID
RAID helps to divide data storage over multiple disks, providing increased data reliability. For FortiAnalyzer units
that contain multiple hard disks, you can configure the RAID array for capacity, performance, and availability.
If the FortiAnalyzer device supports RAID, you can choose the RAIDlevel for the device on the
SystemSettings> RAID Management pane.
The RAID Management tree menu is only available on FortiAnalyzer devices that support RAID.
Linear
Linear RAID combines all hard disks into one large virtual disk. The total space available in this option is the
capacity of all disks used. There is very little performance change when using this RAID format. If any of the
drives fails, the entire set of drives is unusable until the faulty drive is replaced. All data will be lost.
RAID 0
A RAID 0 array is also referred to as striping. The FortiAnalyzer unit writes information evenly across all hard
disks. The total space available is that of all the disks in the RAID array. There is no redundancy available. If any
single drive fails, the data on that drive cannot be recovered. This RAID level is beneficial because it provides
better performance, since the FortiAnalyzer unit can distribute disk writing across multiple disks.
l
RAID 1
A RAID 1 array is also referred to as mirroring. The FortiAnalyzer unit writes information to one hard disk, and
writes a copy (a mirror image) of all information to all the other hard disks. The total disk space available is that of
only one hard disk, as the others are solely used for mirroring. This provides redundant data storage with no
single point of failure. Should any of the hard disks fail, there are backup hard disks available.
36
Administration Guide
Fortinet Technologies Inc.
About RAID
RAID
One write or two reads are possible per mirrored pair. RAID 1 offers redundancy of
data. A re-build is not required in the event of a drive failure. This is the simplest RAID
storage design with the highest disk overhead.
RAID 1 +Spare
A RAID 1 with hot spare (or RAID 1s) array uses one of the hard disks as a hot spare (a stand-by disk for the
RAID). If a hard disk fails, within a minute of the failure, the hot spare is substituted for the failed drive,
integrating it into the RAID array, and rebuilding the RAIDs data. When you replace the failed hard disk, the new
hard disk becomes the new hot spare.
RAID 5
A RAID 5 array employs striping with a parity check. Similar to RAID 0, the FortiAnalyzer unit writes information
evenly across all drives but additional parity blocks are written on the same stripes. The parity block is staggered
for each stripe. The total disk space is the total number of disks in the array, minus one disk for parity storage. For
example, with four hard disks, the total capacity available is actually the total for three hard disks. RAID 5
performance is typically better with reading than with writing, although performance is degraded when one disk
has failed or is missing. With RAID 5, one disk can fail without the loss of data. If a drive fails, it can be replaced
and the FortiAnalyzer unit will restore the data on the new disk by using reference information from the parity
volume.
l
RAID 5 +Spare
A RAID 5 with hot spare array uses one of the hard disks as a hot spare (a stand-by disk for the RAID). If a hard
disk fails, within a minute of the failure, the hot spare is substituted for the failed drive, integrating it into the RAID
array, and rebuilding the RAIDs data. When you replace the failed hard disk, the new hard disk becomes the new
hot spare.
RAID 6
A RAID 6 array is the same as a RAID 5 array with an additional parity block. It uses block-level striping with two
parity blocks distributed across all member disks.
l
RAID 6 +Spare
A RAID 6 with hot spare array is the same as a RAID 5 with hot spare array with an additional parity block.
RAID 10
RAID 10 (or 1+ 0), includes nested RAID levels 1 and 0, or a stripe (RAID 0) of mirrors (RAID 1). The total disk
space available is the total number of disks in the array (a minimum of 4) divided by 2, for example:
l
Administration Guide
Fortinet Technologies Inc.
37
RAID
About RAID
One drive from a RAID 1 array can fail without the loss of data; however, should the other drive in the RAID 1
array fail, all data will be lost. In this situation, it is important to replace a failed drive as quickly as possible.
l
RAID 50
RAID 50 (or 5+0) includes nested RAID levels 5 and 0, or a stripe (RAID 0) and stripe with parity (RAID 5). The
total disk space available is the total number of disks minus the number of RAID 5 sub-arrays. RAID 50 provides
increased performance and also ensures no data loss for the same reasons as RAID 5. One drive in each RAID 5
array can fail without the loss of data.
l
RAID 50 is only available on models with 9 or more disks. By default, two groups are
used unless otherwise configured via the CLI. Use the diagnose system raid
status CLI command to view your current RAID level, status, size, groups, and hard
disk drive information.
RAID 60
A RAID 60 (6+ 0) array combines the straight, block-level striping of RAID 0 with the distributed double parity of
RAID 6.
l
38
Model
RAID Type
RAID Level
Hot Swappable
FAZ-200D
NA
NA
NA
FAZ-300D
Software RAID
Linear, 0, 1
No
Administration Guide
Fortinet Technologies Inc.
Configuring RAID
RAID
Model
RAID Type
RAID Level
Hot Swappable
FAZ-400E
Software RAID
Linear, 0,1,1s,5,5s,10
No
FAZ-1000D
Hardware RAID
0, 1, 5, 10
Yes
FAZ-1000E
Hardware RAID
Yes
FAZ-2000B
Hardware RAID
Yes
FAZ-2000E
Hardware RAID
Yes
FAZ-3000D
Hardware RAID
Yes
FAZ-3000E
Hardware RAID
Yes
FAZ-3000F
Hardware RAID
Yes
FAZ-3500E
Hardware RAID
Yes
FAZ-3500F
Hardware RAID
Yes
FAZ-3900E
Hardware RAID
Yes
FAZ-4000B
Hardware RAID
Yes
Configuring RAID
To configure the RAID level:
1. Go to System Settings > RAID Management.
2. Beside RAID Level, click Change. The RAID Settings dialog box is displayed.
3. From the RAID Level list, select a new RAID level, and click OK.
The FortiAnalyzer unit reboots. Depending on the selected RAID level, it may take a significant amount of
time to generate the RAID array.
If you change the RAID settings, all data will be deleted.
Managing RAID
You can monitor RAIDstatus, swap hard disks, and in some cases, add new disks to the FortiAnalyzer unit.
Administration Guide
Fortinet Technologies Inc.
39
RAID
Managing RAID
Monitoring RAIDstatus
The Alert Message Console widget, which is located in System Settings> Dashboard, provides detailed
information about any RAID array failures. For more information, see Viewing and updating FortiAnalyzer
firmware on page 155.
To view RAIDstatus:
Go to SystemSettings> RAID Management. The RAID Management pane displays the status of each disk in
the RAID array, including the disks RAID level. You can also see how much disk space is being used. For a
description of the fields, see RAID references on page 41.
40
Administration Guide
Fortinet Technologies Inc.
RAID references
RAID
RAID references
RAID Management pane
Following is a description of the fields on the System Settings > RAIDManagement pane.
Field
Description
Summary
Graphic
Displays the position and status of each disk in the RAIDarray. Hover over
each disk to view status details.
RAIDLevel
Administration Guide
Fortinet Technologies Inc.
41
RAID
RAID references
Field
Description
Status
Displays the total size of the disk space, how much disk space is used, and
how much disk space is free.
Disk Management
Disk Number
Disk Status
l
l
42
Size (GB)
Disk Model
Administration Guide
Fortinet Technologies Inc.
Administrative Domains
About ADOMs
FortiAnalyzer administrative domains (ADOMs) are used to create groupings of devices and VDOMs for
configured administrators to monitor and mange. FortiAnalyzer can manage a large number of devices and
VDOMs. This enables administrators to maintain managed devices and VDOMs specific to their geographic
location or business division.
Each FortiAnalyzer ADOM also specifies how much FortiAnalyzer disk space to use for its logs and how long to
store its logs. You can monitor disk utilization for each ADOMand adjust storage settings for logs as needed.
Each administrator is tied to an administrative domain (ADOM). When an administrator logs in, the administrator
sees only those devices or VDOMs configured for that administrator and ADOM. The one exception is
administrative accounts assigned the Super_User profile. These administrators can see and maintain all
administrative domains and the devices within those domains.
Administrative domains are disabled by default, and enabling and configuring the domains can only be performed
by administrators with accounts that are assigned the Super_User profile.
ADOMs must be enabled to support the logging and reporting of non-FortiGate
devices, such as FortiCarrier, FortiClient EMS, FortiMail, FortiWeb, FortiCache, and
FortiSandbox. When a non-FortiGate device is registered with a FortiAnalyzer unit, the
device is added to its respective default ADOM..
Default ADOMs
FortiAnalyzer includes default ADOMs. The default ADOMs are for specific types of devices. When you add one
or more of these devices to FortiAnalyzer, the devices are automatically added to the appropriate ADOM, and
then the ADOMis visible for selection. When a default ADOMcontains no devices, the ADOMis not visible for
selection.
For example, when you add a FortiClient EMSdevice to FortiAnalyzer, the FortiClient EMSdevice is
automatically added to the default FortiClient ADOM. After the FortiClient ADOMcontains a FortiClient
EMSdevice, the FortiClient ADOMis visible for selection when you log into FortiAnalyzer or when you switch
between ADOMs.
You can view all of the ADOMs, including default ADOMs without devices, on the System Settings > All ADOMs
page.
Administration Guide
Fortinet Technologies Inc.
43
Administrative Domains
Configuring ADOMs
l
l
You can only create ADOMs when you are using an administrator account that is assigned the Super_User
administrative profile.
The maximum number of ADOMs you can create depends on the specific FortiAnalyzer system model. Please refer
to the FortiAnalyzer data sheet for information on the maximum number of devices and ADOMs that your model
supports.
You must add a device to only one ADOM. You cannot add a device to multiple ADOMs.
You cannot add FortiGate and FortiCarrier devices to the same ADOM. FortiCarrier devices are added to a specific,
default FortiCarrier ADOM.
You can add one or more VDOMs from a FortiGate device to one ADOM. If you want to add individual VDOMs from
a FortiGate device to different ADOMs, you must first enable ADOMs in advanced device mode.
You can configure how an ADOMhandles log files from its devices. For example, you can configure how much
FortiAnalyzer disk space that an ADOMcan use for logs, and then monitor the fullness of the allotted disk space.
You can also specify how long to keep logs indexed in the SQLdatabase for analysis and how long to keep logs
stored in a compressed format.
Configuring ADOMs
Enabling ADOMs
You must enable the ADOM feature before you can create ADOMs.
44
Administration Guide
Fortinet Technologies Inc.
Configuring ADOMs
Administrative Domains
Creating ADOMs
When you create ADOMs, you can specify what devices to include in the ADOM. You can also specify how much
FortiAnalyzer disk space that the ADOM can use for its logs. You can also specify how long to index logs in the
SQL database to support analysis and how long to store Archive logs for retention.
To create an ADOM:
1. Go to System Settings > All ADOMs.
2. Select Create New from the toolbar. For a description of the fields, see Create(Edit) ADOM dialog box on page
46.
Administration Guide
Fortinet Technologies Inc.
45
Administrative Domains
Configuring ADOMs
Field
Description
Name
Data Policy
Use the Data Policy settings to specify how long to keep logs in
the indexed and compressed states.
Specify how long to keep logs in the indexed state. During the
indexed state, logs are indexed in the SQLdatabase for the specified amount of time, and you can view information about the
logs on the FortiView , Event Monitor, and Reports tabs. After
the specified amount of time expires, logs are automatically
purged from the SQLdatabase.
Disk Utilization
46
Use the Disk Utilization settings to specify how much FortiAnalyzer disk space to use for logs.
Maximum Allowed
Analytics:Archive
Specify how much of the allotted space to use for Analytics and
Archive logs. Analytics logs require more space than Archive
logs. For example, a setting of 70% and 30% indicates that 70%
of the allotted disk space will be used for Analytics logs, and
30% of the allotted space will be used for Archive logs. Select
the Modify check box to change the setting.
Specify at what fullness you want alert messages to be generated and logs to be automatically deleted. The oldest Archive
log files or Analytics database tables are deleted first.
Administration Guide
Fortinet Technologies Inc.
Managing ADOMs
Administrative Domains
Managing ADOMs
You can manage ADOMs by navigating to System Settings >All ADOMs.Options are available in the toolbar.
Some options are available in the right-click menu. Right-click an ADOMto display the menu.
Administration Guide
Fortinet Technologies Inc.
47
Administrative Domains
Managing ADOMs
Option
Description
Create New
Edit
Delete
Deletes the selected ADOM. You cannot delete default ADOMs, such as
the root.
Switch to ADOM
Switches to ADOM.
Expand Devices
Expands the ADOM to show the device list within the ADOM.
Collapse Devices
Field
Description
Name
Displays the name of the ADOM. ADOMs are listed in the following
groups:Central Management and Other Device Types. You can expand
and hide the groups to view the ADOMs contained in the group.
Firmware Version
Allocated Storage
Device
Displays how many devices that the ADOMcontains. You can display and
hide the names of the devices in the ADOMby clicking the triangle.
FortiAnalyzer 5.2.0 and later supports FortiGate, FortiCache, FortiCarrier,
FortiClient, FortiDDoS, FortiMail, FortiSandbox, FortiWeb, Syslog, and others ADOM types.
48
Administration Guide
Fortinet Technologies Inc.
Managing ADOMs
Administrative Domains
Disabling ADOMs
Administration Guide
Fortinet Technologies Inc.
49
ADOM references
50
Administration Guide
Fortinet Technologies Inc.
Administrator Accounts
Administrator Accounts
About administrator accounts
Administrator accounts are used to control administrator access to the FortiAnalyzer unit. Local and remote
authentication is supported as well as two-factor authentication.
FortiAnalyzer includes administrator profiles that define different types of administrators and what level of access
each type of administrator has to devices connected to the FortiAnalyzer unit and to the FortiAnalyzer features.
You can assign an administrator profile to each administrator account.
When you create an administrator account in FortiAnalyzer, you can specify the following items for the
administrator:
l
Authentication method
Administrator profile
You can configure and monitor administrator access to the FortiAnalyzer unit from SystemSettings> Admin.
Administrator accounts
Administrator accounts control who can access the FortiAnalyzer unit, the method of authentication used for the
administrator, the profile associated with the administrator, and the ADOMassociated with the administrator.
Trusted hosts
Setting trusted hosts for all of your administrators increases the security of your network by further restricting
administrative access. In addition to knowing the password, an administrator must connect only through the
subnet or subnets you specify. You can even restrict an administrator to a single IP address if you define only one
trusted host IP address with a netmask of 255.255.255.255.
When you set trusted hosts for all administrators, the FortiAnalyzer unit does not respond to administrative
access attempts from any other hosts. This provides the highest security. If you leave even one administrator
unrestricted, the unit accepts administrative access attempts on any interface that has administrative access
enabled, potentially exposing the unit to attempts to gain unauthorized access.
The trusted hosts you define apply both to the GUI and to the CLI when accessed through SSH. CLI access
through the console connector is not affected.
If you set trusted hosts and want to use the Console Access feature of the GUI, you
must also set 127.0.0.1/255.255.255.255 as a trusted host. By default, Trusted Host 3
is set to this address.
Administration Guide
Fortinet Technologies Inc.
51
Administrator Accounts
Administrator profiles
Administrator profiles are used to limit administrator access privileges to devices or system features. The
administrator profiles restrict access to both the GUI and CLI. You can assign a profile to an administrator when
you create the administrator account.
Predefined profiles
FortiAnalyzer includes the following predefined profiles that you can assign to administrators:
Restricted_User
Standard_User
Super_User
Super user profiles have all system and device privileges enabled. It cannot
be edited.
Restricted_User and Standard_User admin profiles do not have access to the System Settings tab. An administrator with either of these admin profiles will see a
change password icon in the navigation pane.
When Read-Write is selected, the user can view and make changes to the FortiAnalyzer system. When ReadOnly is selected, the user can only view information. When None is selected, the user can neither view or make
changes to the FortiAnalyzer system.
Feature
Standard User
Restricted User
Read-Write
None
None
Read-Write
Read-Write
None
Read-Write
Read-Write
Read-Only
Read-Write
Read-Write
None
FortiView / realtime-monitor
Read-Write
Read-Write
Read-Only
Read-Write
Read-Write
Read-Only
Reports / report-viewer
Read-Write
Read-Write
Read-Only
52
Administration Guide
Fortinet Technologies Inc.
Feature
Administrator Accounts
Standard User
Restricted User
profileid
Super_User
Standard_User
Restricted_User
device-wan-link-loadbalance
Read-Write
Read-Write
Read-Only
device-ap
Read-Write
Read-Write
Read-Only
device-forticlient
Read-Write
Read-Write
Read-Only
log-viewer
Read-Write
Read-Write
Read-Only
You cannot delete these profiles, but standard and restricted user profiles can be edited. You can also create new
profiles as required.
This guide is intended for default users with full privileges. If you create a profile with
limited privileges it will limit the ability of any administrator using that profile to follow
the procedures in this guide.
What authentication method the administrator will use to log into the FortiAnalyzer unit. Local and remote
authentication methods are supported.
The trusted host address and network mask, if using trusted hosts
Administration Guide
Fortinet Technologies Inc.
53
Administrator Accounts
2. Configure the settings, then select OK to create the new administrator account.
Option
Description
Create New
Edit
Delete
Delete the selected administrator account. You cannot delete the default admin
administrator account from the GUI.
54
Administration Guide
Fortinet Technologies Inc.
Administrator profiles
Administrator Accounts
Administrator profiles
Managing administrator profiles
You can manage administrator profiles from the System Settings >Admin >Profile page. Some options are
available as buttons on the toolbar. Some options are available in the right-click menu. Right-click an
administrator profile to display the menu.
Option
Description
Create New
Edit
Delete
Delete the selected administrator profile. You can only delete custom profiles that are
not applied to any administrators. You cannot delete the default administrator profiles:
Restricted_User, Standard_User, and Super_User.
Administration Guide
Fortinet Technologies Inc.
55
Administrator Accounts
Option
Description
Create New
Edit
Edit a remote authentication server. You cannot change the name field
when editing a remote authentication server.
Delete
56
Administration Guide
Fortinet Technologies Inc.
Administrator Accounts
Server Name/IP
Enter the IP address or fully qualified domain name of the LDAP server.
Port
Enter the port for LDAP traffic. The default port is 389.
The common name identifier for the LDAP server. Most LDAP servers use
cn. However, some servers use other common name identifiers such as
uid.
Distinguished Name
The distinguished name used to look up entries on the LDAP servers use.
The distinguished name reflects the hierarchy of LDAP database object
classes above the common name identifier.
Select the query icon to query the distinguished name.
Bind Type
Select the type of binding for LDAP authentication from the drop-down list.
One of: Simple, Anonymous, or Regular.
User DN
Enter the user distinguished name. This option is available when the Bind
Type is set to Regular.
Password
Enter the user password. This option is available when the Bind Type is set
to Regular.
Secure Connection
Protocol
Certificate
Administrative Domain
Select either All ADOMs or Specify to select which ADOMs to link to the
LDAP server. Select Specify and then select the add icon to add
Administrative Domains. Select the remove icon to remove an
Administrative Domain.
Administration Guide
Fortinet Technologies Inc.
57
Administrator Accounts
Server Name/IP
Enter the IP address or fully qualified domain name of the RADIUS server.
Port
Enter the port for RADIUS traffic. The default port is 1812. Some RADIUS
servers use port 1645.
Server Secret
Authentication Type
Enter the authentication type the RADIUS server requires: ANY, PAP,
CHAP, or MSv2. The default setting of ANY has the FortiAnalyzer unit try
all the authentication types.
58
Administration Guide
Fortinet Technologies Inc.
Two-factor authentication
Administrator Accounts
For more information about TACACS+ servers, see the FortiGate documentation.
Server Name/IP
Port
Enter the port for TACACS+ traffic. The default port is 49.
Server Key
Enter the key to access the TACACS+ server. The server key can be a
maximum of 16 characters in length.
Authentication Type
Two-factor authentication
To configure two-factor authentication for administrator login you will need the following:
l
FortiAnalyzer
FortiAuthenticator
FortiToken
Configuring FortiAuthenticator
The following instructions describes the steps required on your FortiAuthenticator device to configure two-factor
authentication for administrator logins.
Before proceeding, ensure that you have configured your FortiAuthenticator and that
you have created a NAS entry for your FortiAnalyzer and created/imported
FortiTokens. For more information, see the FortiAuthenticator Interoperability Guide
and FortiAuthenticator Administration Guide available in the Fortinet Document
Library.
Administration Guide
Fortinet Technologies Inc.
59
Administrator Accounts
Two-factor authentication
Password creation
Password
Password confirmation
Allow RADIUS
authentication
Role
4. Select OK to continue.
Password-based
authentication
Token-based authentication
Deliver token
code by
Allow RADIUS
authentication
60
Administration Guide
Fortinet Technologies Inc.
Two-factor authentication
Administrator Accounts
User Role
Role
Select to allow Full Permission, otherwise select the admin profiles to apply
to the user. This option is only available when Role is Administrator.
Web service
Select to allow Web service, which allows the administrator to access the
web service via a REST API or by using a client application. This option is
only available when Role is Administrator.
Restrict admin
login from
trusted
management
subnets only
Select to restrict admin login from trusted management subnets only, then
enter the trusted subnets in the table. This option is only available when
Role is Administrator.
Allow LDAP
Browsing
Select to allow LDAP browsing. This option is only available when Role is
User.
Client name/IP
Secret
Enter the server secret. This value must match the FortiAnalyzer RADIUS
server setting at System Settings> Admin> Remote Auth Server.
Description
Authentication method
Realms
Configure realms.
Administration Guide
Fortinet Technologies Inc.
61
Administrator Accounts
Two-factor authentication
Allow MAC-based
authentication
Optional configuration.
Check machine
authentication
EAP types
Optional configuration.
Configuring FortiAnalyzer
The following instructions describes the steps required on your FortiAnalyzer device to configure two-factor
authentication for administrator logins.
Server Name/IP
Port
Enter the port for FortiAuthenticator traffic. The default port is 1812.
Server Secret
Authentication Type
62
Administration Guide
Fortinet Technologies Inc.
Admin settings
Administrator Accounts
Admin settings
In the Admin Settings pane, you can configure administration settings, password policy, GUI language, and
GUItheme.
Only administrators with the Super_User profile can access and configure admin settings. The admin settings is global and applies to all the administrators of the FortiAnalyzer unit.
Field
Description
HTTP Port
Enter the TCP port to be used for administrative HTTP access. Select
Redirect to HTTPS to redirect HTTP traffic to HTTPS.
HTTPS Port
Idle Timeout
Note:To ensure security, the idle timeout should be a short period of time
to prevent the administrator from inadvertently leaving the management
computer logged-in and unattended.
Administration Guide
Fortinet Technologies Inc.
63
Administrator Accounts
Admin settings
3. Click Apply.
Must Contain
Admin Password
Expires after
Specify the number of days that a password is valid for, after which time it must be
changed.
4. Click Apply.
Picking a GUItheme
In addition to the default blue GUItheme, FortiAnalyzer provides other themes for you to choose from.
To pick a GUItheme:
1. Go to System Settings> Admin> Admin Settings.
2. Go to Theme, and click a theme to select it. A preview of the theme is displayed.
3. Click Apply.
64
Administration Guide
Fortinet Technologies Inc.
Administrator Accounts
Field
Description
User Name
Comments
Admin Type
Select the type of authentication the administrator will use when logging
into the FortiAnalyzer unit. Select one of: LOCAL, RADIUS, LDAP,
TACACS+, or PKI.
Server
Wildcard
Select this option to set the password as a wildcard. This option is only
available if Admin Type is not LOCAL or PKI.
Subject
CA
If Admin Type is set to PKI, you can select the check box to enforce twofactor authentication.
New Password
Confirm Password
Admin Profile
Select a profile from the list. The profile selected determines the administrators access to the FortiAnalyzer units features.
Restricted_User and Standard_User admin profiles do not have access to
the System Settings tab. An administrator with either of these admin profiles will see a change password icon in the navigation pane.
Administration Guide
Fortinet Technologies Inc.
65
Administrator Accounts
Field
Description
Administrative Domain
Choose the ADOMs this administrator will be able to access, select All
ADOMS, All ADOMs except specified ones or Specify. Select the
remove icon to remove an ADOM.
This field is available only if ADOMs are enabled.The Super_User profile
can only be set to All ADOMs.
Trusted Host
Optionally, enter the trusted host IPv4 or IPv6 address and network mask
from which the administrator can log in to the FortiAnalyzer unit. You can
specify up to ten trusted hosts in the GUI or in the CLI.
Setting trusted hosts for all of your administrators can enhance the security
of your system.
User Information
Field
Description
Profile Name
Description
Other Settings
66
Field
Description
HTTP Port
Enter the TCP port to be used for administrative HTTP access. Select
Redirect to HTTPS to redirect HTTP traffic to HTTPS.
HTTPS Port
Administration Guide
Fortinet Technologies Inc.
Administrator Accounts
Field
Description
Idle Timeout
Language
Select a language from the drop-down list. Select either English, Simplified Chinese, Traditional Chinese, Japanese, Korean, or Auto Detect.
The default value is Auto Detect.
Password Policy
Minimum Length
Select the minimum length for a password. The default is eight characters.
Must Contain
Admin Password
Expires after
Select the number of days that a password is valid for, after which time it
must be changed.
Administration Guide
Fortinet Technologies Inc.
67
Devices
About devices
Devices and VDOMs are added to the FortiAnalyzer unit by using the Device Manager pane. After the device or
VDOM is successfully added and registered, the FortiAnalyzer unit starts collecting logs from the device or
VDOM.
You can also configure the FortiAnalyzer unit to forward logs to another device. See Log Forwarding on page 164.
Unregistered devices
In FortiAnalyzer 5.2.0 and later, the config system global set unregister-pop-up command is
disabled by default. When a device is configured to send logs to FortiAnalyzer, the unregistered device is
displayed in the Device Manager >Devices Unregistered pane. You can then add devices to specific ADOMs or
delete devices by using the toolbar buttons or right-click menu.
You can see the quick status bar at the top of the Device Manager pane. The quick status bar contains the
following tabs:
68
Devices Log Status Down:Displays the registered devices with a log status of down.
Administration Guide
Fortinet Technologies Inc.
Adding devices
Devices
Adding devices
You must add and register devices and VDOMs to the FortiAnalyzer unit to enable the device or VDOM to send
logs to the FortiAnalyzer unit. Registered devices are also known as devices that have been promoted to the DVM
table.
Devices must be configured to send logs to the FortiAnalyzer unit. For example, after
you add and register a FortiGate device with the FortiAnalyzer unit, you must also
ensure that the FortiGate device is configured to send logs to the FortiAnalyzer unit. In
the device GUI, go to Log &Report >Log Settings, and set the Send Logs to
FortiAnalyzer/FortiManager setting.
Administration Guide
Fortinet Technologies Inc.
69
Devices
Adding devices
70
Administration Guide
Fortinet Technologies Inc.
Device references
Devices
Device references
Device Manager >Devices Total pane
The following columns are displayed on the Device Manager >Devices Total and the Device Manager
>Devices Log Status Down pane.
Column
Description
Device Name
IP Address
Platform
Logs
Identifies whether the device is successfully sending logs to the FortiAnalyzer unit. A green circle indicates that logs are being sent. Ared circle indicates that logs are not being sent.
A lock icon displays when a secure tunnel is being used to transfer logs
from the device to the FortiAnalyzer unit.
Displays the average rate at which the device is sending logs to the
FortiAnalyzer unit in log rate per second. Click the number to display a
graph of historical average log rates.
Administration Guide
Fortinet Technologies Inc.
71
Devices
Device references
Column
Description
Device Storage
Displays how much of the allotted disk space has been consumed by logs.
Description
The following buttons and menus are available for selection on the toolbar:
Button
Description
Add Device
Opens the Add Device Wizard to add a device to the FortiAnalyzer unit.
The device is added, but not registered with the FortiAnalyzer unit. Unregistered devices are displayed in the Unregistered Devices tree menu.
Edit
Delete
Column Settings
Click the Column Settings menu, and select the columns that you want to
display in the content pane. Select Reset to Default to display the default
columns.
More
Click the More menu, and select Import Device List or Export Device List.
Search
Type the name of a device. The content pane displays the results. Clear
the search box to display all devices in the content pane.
Column
Description
Device Name
Model
Serial Number
Connecting IP
The following buttons and menus are available for selection on the toolbar:
72
Button
Description
Add
Click to register the selected device with the FortiAnalyzer unit, which
enables the FortiAnalyzer unit to receive logs from the device.
Delete
Administration Guide
Fortinet Technologies Inc.
Device references
Devices
Field
Description
IPAddress
SN
Device Name
Device Model
Firmware Version
Description
Next
Cancel
Field
Description
Name
Description
Company/Organization
Displays the name of the company or organization that owns the device.
Country
Province/State
Displays the name of the province or state where the device resides.
City
Contact
Geographic Coordinates
This section displays the latitude and longitude coordinates for the device.
Latitude
Displays the latitude of the device location to support the interactive map
on the FortiView >Summary > Threats >Threat Map pane.
Administration Guide
Fortinet Technologies Inc.
73
Devices
74
Device references
Field
Description
Longitude
Displays the longitude of the device location to support the interactive map
on the FortiView >Summary > Threats >Threat Map pane.
IPAddress
Admin User
Password
Device Information
This section displays the serial number, device model, and firmware version for the device.
Serial Number
Device Model
Firmware Version
HACluster
Secure Connection
Select to enable a secure connection between the device and the FortiAnalyzer unit.
ID
Pre-Shared Key
Device Permissions
Administration Guide
Fortinet Technologies Inc.
When ADOMs are enabled, you can configure unique log storage settings for each ADOM, and the settings apply to
all devices in each ADOM.
When ADOMs are disabled, you can configure log storage settings once, and the settings apply to all managed
devices.
You can also configure global log settings by using the System Settings>
Advanced> File Management pane. The settings apply to all logs on the FortiAnalyzer unit in addition to the log storage settings.
Disk Size
The system reserves either 20% or 50GB of disk space, which ever is smaller.
The system reserves either 15% or 100GB of disk space, which ever is
smaller.
The system reserves either 10% or 200GB of disk space, which ever is
smaller.
The system reserves either 5% or 500GB of disk space, which ever is smaller.
Administration Guide
Fortinet Technologies Inc.
75
Disk Size
Note: The RAID level selected will impact the determination of the disk size and reserved disk quota level.
For example, a FAZ-1000C with four 1TB hard drives configured in RAID 10 will be considered a large disk
and 10% or 200GB disk space will be reserved.
Data policy
The data policy specifies how long to store Archive logs for each device. When the specified amount of time
expires, Archive logs for the device are automatically deleted from the FortiAnalyzer disks. Deletion of logs is
triggered by the data policy associated with the device.
All deletion policies are active on the FortiAnalyzer unit at all times, and you should carefully configure each
policy. For example, if the disk fullness policy for a device hits its threshold before the global automatic file
deletion policy for the FortiAnalyzer unit, Archive logs for the affected device are automatically deleted.
Conversely, if the global automatic file deletion policy hits its threshold first, the oldest Archive logs on the
FortiAnalyzer unit, regardless of the log storage settings associated with the device, are automatically deleted.
The following table summarizes the different automatic deletion polices:
76
Administration Guide
Fortinet Technologies Inc.
Policy
Scope
Trigger
Global
automatic
file deletion
When the specified amount of time expires, old files are automatically
deleted. This policy affects all files in the system regardless of the data
policy settings associated with devices.
Data
policy
When the specified amount of retention time expires, old Archive logs for
the device are deleted. This policy affects only Archive logs for the device
with which the data policy is associated.
Automatic
log deletion
When the specified threshold is reached for the allotted amount of disk
space for the device, the oldest Archive logs are deleted for the device.
This policy affects only Archive logs for the device with which the log storage settings are associated.
Administration Guide
Fortinet Technologies Inc.
77
When devices send logs to a FortiAnalyzer unit, the logs enter the following automatic workflow:
1. Logs are compressed and saved in a log file on the FortiAnalyzer disks.
When the log file that receives new logs reaches a specific size, it rolls over and is archived. A new log file is
created to receive incoming logs. You can specify the size at which the log file rolls over.
2. Logs are indexed in the SQLdatabase to support analysis.
You can specify how long to keep logs indexed by using a data policy.
3. Logs are purged from the SQLdatabase, but remain compressed in a log file on the FortiAnalyzer disks.
4. Logs are deleted from the FortiAnalyzer disks.
You can specify how long to keep logs by using a data policy.
While logs are indexed in the SQLdatabase, they are considered online, and you can view details about the logs
on the FortiView pane and the Event Monitor pane. You can also generate reports about the logs by using the
Reports pane.
While logs are compressed and archived on the FortiAnalyzer disks, they are considered offline, and you cannot
immediately view details about the logs on the FortiView pane or the Event Monitor pane. You also cannot
immediately generate reports about the logs by using the Reports pane. For more information, see Archive logs
and Analytics logs on page 20.
The following table summarizes the differences between indexed and compressed log phases:
78
Administration Guide
Fortinet Technologies Inc.
Log Phase
FortiAnalyzer
Location
Indexed
Compressed in
log file and
indexed in
SQLdatabase
Yes. Logs are available for analytic use in FortiView , Event Monitor and
Reports.
Compressed
Compressed in
log file
No.
You can control how long to keep logs in indexed and compressed phases by using a data policy. See Configuring
log storage policy on page 79.
If you change the log storage settings, the new date ranges affect Analytics and
Archive logs that are currently on the FortiAnalyzer unit. Depending on the date
change, Analytics logs can be purged from the database, Archive logs can be added
back to the database, and Archive logs outside the date range can be deleted.
Administration Guide
Fortinet Technologies Inc.
79
Specify how long to keep Archive logs. Make sure your setting meets your
organization's regulatory requirements.
Disk Utilization
Maximum
Allowed
Specify the maximum disk space allotted to this ADOM. See also
FortiAnalyzer disk space allocation on page 75.
Analytics
:Archive
Specify the disk space ratio between Analytics and Archive logs. Analytics
logs require more space than Archive logs. The factory setting is 60%
:40%. Select the Modify check box to change the setting.
Specify at what fullness you want alert messages to be generated and logs
to be automatically deleted. The oldest Archive log files or Analytics
database tables are deleted first.
80
Administration Guide
Fortinet Technologies Inc.
3. Configure the settings as you do when ADOMs are enabled (see Configuring log storage settings with ADOMs
enabled on page 79), and click OK.
Administration Guide
Fortinet Technologies Inc.
81
Go to System Settings> Storage Info. The log storage policy of all ADOMs is displayed in tabular format.
Column Heading
Description
Name
Analytics (Actual/Config
Days)
Displays the age in days of the oldest Analytics logs (Actual Days), as well
as the number of days that Analytics logs will be kept according to the data
policy (Config Days).
Archive (Actual/Config
Days)
Displays the age in days of the oldest Archive logs (Actual Days), as well as
the number of days that Archive logs will be kept according to the data policy
(Config Days).
Max Storage
Displays the maximum disk space that is allotted for this ADOM (Analytics
and Archive logs altogether). For more info about the maximum available
space for each FortiAnalyzer unit, see FortiAnalyzer disk space allocation on
page 75.
Displays how much disk space that Analytics logs have used, as well as the
maximum disk space allotted for Analytics logs.
Displays how much disk space that Archive logs have used, as well as the
maximum disk space allotted for Archive logs.
You can double-click an ADOMentry to configure its log storage settings. See Configuring log storage settings
with ADOMs enabled on page 79.
Go to LogView > Storage Statistics. Visualizations of disk space usage of both Analytics and Archive logs are
displayed, with Analytic Policy charts showing an overview, and Analytic Details charts showing the disk space
usage details.
You can also access Storage Statistics from Device Manager > Storage Used.
l
l
82
Hover the mouse over the charts to view more information about the chart or data point.
For the Analytic Details and Archive Details line charts, you can click on a data point to drill down into a breakdown
by device.
Administration Guide
Fortinet Technologies Inc.
Charts
Description
Analytic Policy
Displays how much of the disk quota for Analytics logs has been used, as
well as the Actual and Configure Days of the Analytics logs.
Analytic Details
Shows the disk usage by Analytics logs over time. The blue line shows
actual usage, and the red horizontal line marks the maximum allotted disk
space. Double click a data point to drill down into a breakdown by device.
Archive Policy
Displays how much of the disk quota for Archive logs has been used; as well
as the Actual and Configure Days of the Archive logs.
Archive Details
Shows the disk usage by Archive logs over time. The blue line shows actual
usage, and the red horizontal line marks the maximum allotted disk space.
Double click a data point to drill down into a breakdown by device.
When the ADOMis reaching its maximum disk quota, a warning dialog box will be displayed. If you click
Configure Now, it will direct you to the Edit Log Storage Policy dialog box to adjust log storage policy. See
Configuring log storage settings with ADOMs enabled on page 79.
Administration Guide
Fortinet Technologies Inc.
83
84
Administration Guide
Fortinet Technologies Inc.
Select to roll logs daily or weekly. When selecting daily, select the hour and
minute value in the drop-down lists. When selecting weekly, select the day,
hour, and minute value in the drop-down lists.
Upload Server
Type
Upload Server IP
User Name
Select the username that will be used to connect to the upload server.
Password
Select the password that will be used to connect to the upload server.
Remote Directory
Select the remote directory on the upload server where the log will be
uploaded.
Select to upload log files when they are rolled according to settings
selected under Roll Logs or daily at a specific hour.
Select to gzip the logs before uploading. This will result in smaller logs, and
faster upload times.
Select to remove device log files from the FortiAnalyzer system after they
have been uploaded to the Upload Server.
IP Address
Upload Option
Severity Level
Select the minimum log severity level from the drop-down list.
Secure
connection for
log transmission
Verifies whether the log file has exceeded its file size limit
Checks to see if it is time to roll the log file if the file size is not exceeded.
Administration Guide
Fortinet Technologies Inc.
85
Configure the time to be either a daily or weekly occurrence, and when the roll occurs. When a current log file
(tlog.log) reaches its maximum size, or reaches the scheduled time, the FortiAnalyzer unit rolls the active log
file by renaming the file. The file name will be in the form of xlog.N.log (for example,
tlog.1252929496.log), where x is a letter indicating the log type and N is a unique number corresponding to
the time the first log entry was received. The file modification time will match the time when the last log was
received in the log file.
Once the current log file is rolled into a numbered log file, it will not be changed. New logs will be stored in the
new current log called tlog.log. If log uploading is enabled, once logs are uploaded to the remote server or
downloaded via the GUI, they are in the following format:
FG3K6A3406600001-tlog.1252929496.log-2012-09-29-08-03-54.gz
If you have enabled log uploading, you can choose to automatically delete the rolled log file after uploading,
thereby freeing the amount of disk space used by rolled log files. If the log upload fails, such as when the FTP
server is unavailable, the logs are uploaded during the next scheduled upload.
Log rolling and uploading can be enabled and configured in the GUI in System Settings > Advanced > Device
Log Settings. For more information, see Configuring rolling and uploading of logs on page 84. Log rolling and
uploading can also be enabled and configured using the CLI. For more information, see the FortiAnalyzer CLI
Reference.
where <integer> is the size at which the logs will roll, in MB.
86
Administration Guide
Fortinet Technologies Inc.
end
where:
hour <integer>
The hour of the day when the when the FortiAnalyzer rolls the traffic analyzer logs.
min <integer>
The minute when the FortiAnalyzer rolls the traffic analyzer logs.
file-size
<integer>
where:
days {mon
tue|
thu|
sat|
|
wed|
fri|
sun}
The days week when the FortiAnalyzer rolls the traffic analyzer logs.
hour <integer>
The hour of the day when the when the FortiAnalyzer rolls the traffic analyzer logs.
min <integer>
The minute when the FortiAnalyzer rolls the traffic analyzer logs.
Administration Guide
Fortinet Technologies Inc.
87
FortiView
About FortiView
You can view summaries of log data in FortiView in both tabular and graphical formats. For example, you can
view top threats to your network, top sources of network traffic, and top destinations of network traffic. For each
summary view, you can drill down into details.
In 5.4.1, FortiView is supported for FortiGate, FortiCarrier, and FortiClient EMS devices.
View
Description
Summary
An overview
Threats
Top Threats
Threat Map
88
Administration Guide
Fortinet Technologies Inc.
About FortiView
Category
Traffic
VPN
Administration Guide
Fortinet Technologies Inc.
FortiView
View
Description
Indicators of
Compromise
Displays end users with suspicious web use compromises, including end users' IPaddresses, overall
threat rating, and number of threats. Drill-downs are
available to view threat details.
Note:To use this feature, 1)UTM logs of the connected
FortiGate devices must be enabled; 2)The FortiAnalyzer needs to subscribe to FortiGuard to keep its threat
database up to date.
Top Sources
Top Destinations
Displays information about the top destinations of network traffic by displaying the destination IP addresses
and the application used to access the destination
Top Countries
Policy Hits
Top Applications
Top Websites
Top Browsing
Users
SSL &Dialup
IPsec
Site-to-Site IPsec
Displays the names of VPN tunnels with Internet protocol security (IPSEC) that are accessing the network
89
FortiView
About FortiView
Category
View
Description
WiFi
Rogue APs
Displays the service set identifiers (SSID) of unauthorized WiFi access points on the network
Authorized APs
Authorized SSIDs
WiFi Clients
Admin Logins
System Events
Resource Usage
Displays device CPU, memory, logging, and other performance information for the managed device
All Endpoints
Endpoints Vulnerabilities
System
Endpoints
View
Description
Threats
Top Threats
Application
& Websites
90
Top Applications
Displays information about the top applications being used on the network, including the application name, category, and risk level
Top Websites
Displays the top allowed and blocked web sites on the network
Administration Guide
Fortinet Technologies Inc.
Using FortiView
FortiView
Category
View
Description
Endpoints
All Endpoints
Endpoints Vulnerabilities
Using FortiView
When ADOMs are enabled, FortiView displays information for each ADOM. As a result, you should ensure that
you are in the correct ADOM before viewing contents of FortiView . See also Switching between ADOMs on page
25.
You can create multiple views/widgets for a FortiView summary. For example, you can
create two Top Threats views:one of Top 10 Threats view in bubble chart format, and
one of Top 20 Threats in table format.
Administration Guide
Fortinet Technologies Inc.
91
FortiView
Using FortiView
You can now see the newly added widget on the Summary page.
Click the Remove This Widget button on the top-right corner of the widget.
To specify a time period for all the views on the Summary page:
l
On the FortiView Summary page, select a time period from the time period drop-down list
in the toolbar.
On the FortiView Summary page, click the Refresh Now button in the toolbar or select a refresh rate from the
drop-down menu.
On the FortiView Summary page, click the Full Screen button in the toolbar.
92
Administration Guide
Fortinet Technologies Inc.
Using FortiView
FortiView
2. On the settings panel, configure the settings for the widget, such as Chart Type, Show Top, and Sort By.
3. Click OK on the top-right corner to save the changes.
Administration Guide
Fortinet Technologies Inc.
93
FortiView
Using FortiView
4. Choose a sort method for the graphic from the Sort By list in the top-right corner.
5. Hover the mouse over a graphical element to view more information.
6. Click an element to drill down. You can then view details about different dimensions of the entry in different tabs.
7. You can continue drilling down by double-clicking an entry.
8. Click the Back button in the toolbar to return to the previous view.
3. Choose a sort method from the Sort By list in the top-right corner.
4. Hover the mouse over the map to view more information.
94
Administration Guide
Fortinet Technologies Inc.
Using FortiView
FortiView
Use Regular Search. In the selected summary view, click in the Add Filter box, select a filter from the dropdown list, and type a value. You can click NOTto negate the filter value. You can add multiple filters at a time,
and connect them with "and" or "or".
Use Advanced Search. Click the Switch to Advanced Search icon at the end of the Add Filter box. In the
Advanced Search mode, you provide the whole search criteria (log field names and values) by typing. Click
Switch to Regular Search icon to go back to regular search.
In the selected summary view, right-click an entry, and select the filter criteria (Search filter value).
Depending on the column in which your mouse is placed when you right-click, FortiView will use the column value of
the selected entry as the filter criteria. This context-sensitive filter is only available for certain columns.
Administration Guide
Fortinet Technologies Inc.
95
FortiView
Using FortiView
From the Top drop-down list, specify the number of entries to export.
(If you are in a drilldown view) In the Drilldown section, the tab that you are in is selected by default. You
can select more tabs if you want.
3. Click OK.
Note:The filtered summaries will be exported in the tabular format, no matter in which format (tabular or
graphical) you execute the export function.
Note:Only the log field filters are exported. The device and time period filters are not exported.
To export filtered summaries to report charts:
1. In the filtered summary view or its drilldown, click Export to Report Chartin the top-right corner.
2. In the Export to Report Chartdialog box that opens, review and configure the settings:
l
Type a chart name.
l
l
From the Show Top drop-down list, specify the number of entries to export.
(If you are in a drilldown view) In the Drilldown section, the tab that you are in is selected by default. You
can select more tabs if you want. One chart will be created for each tab.
3. Click OK.
The charts are saved in the Chart Library. You can use them in the same way as you use other charts.
Note:The filtered summaries will be exported in the tabular format, no matter in which format (tabular or
graphical) you execute the export function.
96
Administration Guide
Fortinet Technologies Inc.
FortiView
To use this IOCsummary, you must turn on the UTM web filter of FortiGate devices.
You must also subscribe your FortiAnalyzer unit to FortiGuard to keep its local threat
database synced with the FortiGuard threat database. See Subscribing FortiAnalyzer
to FortiGuard on page 97.
2. You can filter the entries by adding filters, as well as specifying devices or a time period.
3. You can acknowledge the IOCof an end user by clicking Ack in the Acknowledge column.
4. You can double-click an entry to drill down and view threat details.
Administration Guide
Fortinet Technologies Inc.
97
FortiView
The administration team received a $6000 invoice from a software provider to license an application called
Widget-Pro. According to the software provider, an employee at Company ABC is using Widget Pro software.
The system administrator wants to find who is using applications that are not in the company's list of approved
applications. The administrator also wants to determine whether the user is unknown to FortiGuard signatures,
identify the list of users, and perform an analysis of their systems.
98
Administration Guide
Fortinet Technologies Inc.
Log View
About Log View
You can view the traffic log, event log, or security log information per device or per log group.
When rebuilding the SQL database, Log View will not be available until after the
rebuild is completed. Select the Show Progress link in the message to view the status
of the SQL rebuild.
Historical logs and Real-time logs in Log View are from Analytics logs.
Log Browse can display logs from both the current, active log file and any of the compressed log files.
For more information, see Archive logs and Analytics logs on page 20.
Device Type
Log Type
FortiAnalyzer
Event
FortiGate
Traffic
Event: Compliance Events, Endpoint, HA, System, Router, VPN, User, WAN Opt. &
Cache, and Wireless
Security: Vulnerability Scan, Antivirus, Web Filter, Application Control, Intrusion Prevention, Email Filter, Data Leak Prevention, Web Application Firewall
FortiClient
VoIP
Content logs are also collected for FortiOS 4.3 devices.
FortiCarrier
FortiCache
Administration Guide
Fortinet Technologies Inc.
99
Log View
Device Type
Log Type
FortiClient
FortiDDoS
FortiMail
FortiManager
Event
FortiSandbox
FortiWeb
Syslog
Generic
Traffic logs
Traffic logs record the traffic that is flowing through your FortiGate unit. Since traffic needs firewall policies to
properly flow through the unit, this type of logging is also referred to as firewall policy logging. Firewall policies
control all traffic that attempts to pass through the FortiGate unit, between FortiGate interfaces, zones and VLAN
sub-interfaces.
Event logs
The event log records administration management as well as Fortinet device system activity, such as when a
configuration has changed, or admin login or HA events occur. Event logs are important because they record
Fortinet device system activity, which provides valuable information about how your Fortinet unit is performing.
The FortiGate event logs includes System, Router, VPN , and User menu objects to provide you with more
granularity when viewing and searching log data.
Security logs
Security logs (FortiGate) record all antivirus, web filtering, application control, intrusion prevention, email filtering,
data leak prevention, vulnerability scan, and VoIP activity on your managed devices.
The logs displayed on your FortiAnalyzer are dependent on the device type logging to
it and the features enabled. FortiGate, FortiCarrier, FortiCache, FortiMail, FortiManager, FortiWeb, FortiSandbox, FortiClient and Syslog logging is supported. ADOMs
must be enabled to support non-FortiGate logging.
For more information on logging see the Logging and Reporting for FortiOS Handbook in the Fortinet Document
Library.
When rebuilding the SQL database, Log View will not be available until after the
rebuild is completed. Although you can view older logs, new logs will not be inserted
into the database until after the rebuild is completed. Select the Show Progress link in
the message to view the status of the SQL rebuild.
100
Administration Guide
Fortinet Technologies Inc.
Log messages
Log View
Log messages
You can view the traffic log, event log, or security log information per device or per log group.
Double-click a log message on the log message list. The log details pane is displayed to the right side of the log
message list, with the log fields categorized in tree view.
(Alternative) Select the log message and then click Display Details in the bottom right corner.
Log details pane also provides shortcuts for adding filters as well as showing or hiding a
column. Just right-click a log field, and select the desired option.
Administration Guide
Fortinet Technologies Inc.
101
Log View
Log messages
To view UTMlogs:
l
If the log message contains UTMlogs, you can click the UTM log icon in the log details pane to open the UTMlog
view window.
Place the cursor in the column header area, and then move a column by dragging and dropping.
102
Administration Guide
Fortinet Technologies Inc.
Log messages
Log View
Use Regular Search. In the selected log view, click in the Add Filter box, select a filter from the drop-down list,
and type a value. You can use operators such as OR, NOT, Greater than, and Less than. See also Search
operators and syntax on page 104.
Note:Only columns that are displayed are available on the drop-down filter list.
Use Advanced Search. Click the Switch to Advanced Search icon at the end of the search bar. In the
Advanced Search mode, you type the search criteria (log field names and their values). You can click next to
the search bar to open the Search operators and syntax pane (which is also described in Search operators and
syntax on page 104). You can click Switch to Regular Search icon to go back to regular search.
You can also type any string in the search bar to start a freestyle" search. FortiAnalyzer will then search the
string within the indexed fields that can be configured using the CLI command: config ts-index-field.
For example, if the indexed fields have been configured like this using the CLI command:
config system sql
config ts-index-field
edit "FGT-traffic"
set value "app,dstip,proto,service,srcip,user,utmaction"
next
end
end
Then if you type "Skype" in the search bar, FortiAnalyzer will search for Skype within these indexed
fields: app,dstip,proto,service,srcip,user, and utmaction.
You can combine freestyle search with other search methods, for example, Skype user=David.
The filters are case-insensitive by default. If you want to make your filters casesensitive, select Case Sensitive Search from the Tools drop-down menu in the
tool bar.
2. In the Device list, select a device.
3. In the Time list, select a time period.
4. Click Go.
In a log message list view, right-click a log entry, and select a filter criterion. The search criterion with a icon will
return entries that match the filter values, while the search criterion with a icon will return entries that negate the
filter values.
Depending on the column in which your cursor is placed when you right-click, Log View will use the column
value of the selected entry as the filter criteria. This context-sensitive filter is only available for certain columns.
You can get the corresponding log field name of a filter/column name by right-clicking
on the column of any log entry and selecting a context-sensitive filter. The filter will be
displayed in the search bar, with the filter name translated into the corresponding log
field name.
The context-sensitive filters are also available for each log field in the log details pane.
See Viewing log message details on page 101.
Administration Guide
Fortinet Technologies Inc.
103
Log View
Log messages
Syntax
And
Find log entries that contain all the search terms. Connect the terms with a
space character, or and.
Example: user=henry group=sales; (alternative) user=henry
and group=sales
Or
Find log entries that contain any of the search terms. Separate the terms
with or or a comma ,.
Examples: 1)user=henry or srcip=10.1.0.15; 2) userr=henry,linda
Not
Find log entries that do NOT contain the search terms. Add - before the
field name.
Example: -user=henry
>, <
Find log entries greater than or less than a value, or within a range. Can
only be applied to Integer field type.
Example: policyid>1 and policyid<10
IP subnet/range search
You can search for log entries within a certain IP subnet or range.
Examples: 1) srcip=192.168.1.0/24; 2) srcip=10.1.0.110.1.0.254
Wildcard search
104
In the log message list view, select Real-time Log from the Tools drop-down menu in the toolbar.
To switch back to historical log view, select Historical Log from the Tools drop-down menu.
Administration Guide
Fortinet Technologies Inc.
Log messages
Log View
In the log message list view, select Display Raw from the Tools drop-down menu in the toolbar.
To switch back to formatted log view, select Display Formatted from the Tools drop-down menu in the toolbar.
For more information about FortiGate raw logs, see the FortiGate Log Message Reference in the Fortinet
Document Library. For more information about raw logs of other devices, see the Log Message Reference for
the platform type.
Custom views
You can use Custom View to save a filter setting, device selection, and time period that you have specified so
that you can go to this view at any time to view results without having to re-specify these criteria.
5. In the Name field, type a name for the new custom view. All other fields are read-only.
6. Click OK. The custom view is now displayed under Log View >Custom View .
Administration Guide
Fortinet Technologies Inc.
105
Log View
Log groups
Select a log format from the Log file format drop-down list, either Text or CSV.
Select Current Page to download only the current log message page, or All Pages to download all the pages in
the log message list.
5. Click OK.
Log groups
You can group devices into log groups. You can then specify to view FortiView summaries, display logs, generate
reports, or create handlers for a log group, as you can specify to perform such activities for an individual device.
Log groups are virtual. They do not have SQL databases or occupy additional disk space.
In FortiAnalyzer 5.0.6 and earlier, log groups can be treated as a single device which
has its own SQL database. This has been changed since FortiAnalyzer 5.2.
106
Administration Guide
Fortinet Technologies Inc.
Log Browse
Log View
Log Browse
When a log file reaches its maximum size or a scheduled time, the FortiAnalyzer rolls the active log file by
renaming the file. The file name will be in the form of xlog.N.log, where x is a letter indicating the log type,
and N is a unique number corresponding to the time the first log entry was received. (For information about
setting the maximum file size and log rolling options, see Configuring rolling and uploading of logs by using the
CLI on page 85.)
You can view logs in the compressed phase of the log workflow in Log Browse. Log Browse displays log files
stored for both devices and the FortiAnalyzer itself.
Administration Guide
Fortinet Technologies Inc.
107
Log View
If the device_id field in the uploaded log file does not match the device, the import will fail. Select Return to
attempt another import.
If you selected [Take From Imported File], and the FortiAnalyzer units device list does not currently contain
that device, a message appears after the upload. Select OK to import the log file and automatically add the
device to the device list.
108
Field
Description
Name
Administration Guide
Fortinet Technologies Inc.
Log View
Field
Description
Columns
Select which columns of data to include in the chart based on the log messages that are displayed on the Log View page.
Group By
Order By
Sort
Show Limit
Device
Time Frame
Query
Preview
Administration Guide
Fortinet Technologies Inc.
109
Event Monitor
About events
Event Monitor displays all of the events generated by event handlers. Event handlers define what messages to
extract from the logs and display in Event Monitor. The system includes a number of predefined event handlers
that you can enable to start populating Event Monitor. You can also create custom event handlers.
During the rebuild of the SQL database, you may not be able to see a complete list of
historical events. However, you can always see events that are triggered from realtime logs. You can view the status of the SQL rebuild by checking the Rebuilding
DBstatus in the Notification Center.
Note:FortiAnalyzer 5.4 provides predefined event handlers for FortiGate and FortiCarrier devices. For other
devices, you will have to create your own event handlers.
Event handlers
Event handlers define what messages to extract from logs and display in Event Monitor. You can enable
predefined event handlers to generate events, or you can create and enable custom event handlers to generate
events.
You can configure event handlers to generate events for a specific device, for all devices, or for the local
FortiAnalyzer unit. You can create event handlers for FortiGate, FortiCarrier, FortiCache, FortiMail,
FortiManager, FortiWeb, FortiSandbox devices, and syslog servers. In 5.2.0 or later, Event Management
supports local FortiAnalyzer event logs.
You can also configure the system to send you alerts for event handlers. You can send the alert to an email
address, SNMP community, or syslog server.
110
Administration Guide
Fortinet Technologies Inc.
Event handlers
Event Monitor
Administration Guide
Fortinet Technologies Inc.
111
Event Monitor
Event handlers
6. Click OK.
112
Administration Guide
Fortinet Technologies Inc.
Events
Event Monitor
Option
Description
Create New
Create a new event handler. This option is available in the toolbar and
right-click menu.
Edit
Delete
Delete the selected event handler. You cannot delete predefined event
handlers.
Clone
Clone the selected event handler. A cloned entry will have Copy added to
its name field. You can rename the cloned entry while editing the event
handler.
Enable
Enable the selected event handler to start generating events on the Event
Management >All Events page.
Disable
Disable the selected event handler to stop generating events on the Event
Management >All Events page.
Factory Reset
Return the settings for the selected predefined event handler to factory settings. This option is only available after you have edited a predefined event
handler.
Events
After event handlers start generating events, you can view the events and event details. Event Monitor provides a
tabular view of recent events, as well as chart views of Event by Type and Event by Severity.
Administration Guide
Fortinet Technologies Inc.
113
Event Monitor
Events
Double-click the graphical element to view the corresponding filtered event list.
You can view event details by double-clicking an event summary entry. See Viewing event details on page 114.
5. Check Recent Events in tabular view.
l
Include acknowledged events in the view by selecting the Show Acknowledged check box.
Click an Event Name hyperlink to view more information about the event.
You can view event details by double-clicking an event summary entry. See Viewing event details on page 114.
114
Administration Guide
Fortinet Technologies Inc.
Event references
Event Monitor
3. Click the Back button in the toolbar to return to event summary page.
Acknowledging events
When you acknowledge an event, it will be hidden from the event list.
To acknowledge event(s):
1. From the event list, select one or multiple events that you would like to acknowledge.
2. Right-click and select Acknowledge. The acknowledged events are hidden from the event list.
If you want to view acknowledged events, select the Show Acknowledged check box.
Event references
List of predefined event handlers
FortiAnalyzer includes predefined event handlers for FortiGate and FortiCarrier devices that you can use to
generate events.
Event Handler
Description
Antivirus Event
Severity: High
Log Type: Traffic Log
Event Category: Antivirus
Group by: Virus Name
Log messages that match all conditions:
l
Administration Guide
Fortinet Technologies Inc.
115
Event Monitor
Event references
Event Handler
Description
Severity: Medium
Log Type: Traffic Log
Event Category: Application ControlGroup by: Application Name
Log messages that match any of the following conditions:
Conserve Mode
Severity: Critical
Log Type: Event Log
Event Category: System
Group by: Message
Log messages that match all conditions:
l
DLP Event
Severity: Medium
Log Type: Traffic Log
Event Category: DLP
Group by: DLP Rule Name
Log messages that match all conditions:
l
HA Failover
Interface Up
116
Severity: Medium
Log Type: Event Log
Event Category: HA
Group by: Log Description
Log messages that match all conditions:
l
Interface Down
Severity: High
Log Type: Event Log
Event Category: System
Group by: Message
Log messages that match all conditions:
l
Severity: Medium
Log Type: Event Log
Event Category: System
Group by: Message
Log messages that match all conditions:
l
Status Equal To UP
Administration Guide
Fortinet Technologies Inc.
Event references
Event Monitor
Event Handler
Description
Severity: Critical
Log Type: IPS
Group by: Attack Name
Log messages that match all conditions:
l
Severity: High
Log Type: IPS
Group by: Attack Name
Log messages that match all conditions:
l
Administration Guide
Fortinet Technologies Inc.
Severity: Medium
Log Type: Event Log
Event Category: VPN
Group By: VPN Tunnel Log messages that match all conditions:
l
Severity: Medium
Log Type: Event Log
Event Category: VPN
Group By: VPN Tunnel
Log messages that match all conditions:
l
IPsec Phase2 Up
Severity: Low
Log Type: IPS
Group by: Attack Name
Log messages that match all conditions:
l
Severity: Medium
Log Type: IPS
Group by: Attack Name
Log messages that match all conditions:
l
117
Event Monitor
Event references
Event Handler
Description
Severity: Critical
Log Type: Event Log
Event Category: System
Group by: Message
Log messages that match any of the following conditions:
Severity: High
Log Type: Virus
Group by: Virus Name
Log messages that match all conditions:
l
Severity: Medium
Log Type: Application Control
Group by: Application Name
Log messages that match any of the following conditions:
l
Severity: Medium
Log Type: DLP
Group by: DLP Rule Name
Log messages that match all conditions:
l
Severity: Medium
Log Type: Web Filter
Group by: Category
Log messages that match any of the following conditions:
l
Web Category Equal To Child Abuse, Discrimination, Drug
Abuse, Explicit Violence, Extremist Groups, Hacking, Illegal or
Unethical, Plagiarism, Proxy Avoidance, Malicious Websites,
Phishing, Spam URLs
Severity: Medium
Log Type: Traffic Log
Event Category: WebFilter
Group by: Category
Log messages that match any of the following conditions:
l
Web Category Equal To Child Abuse, Discrimination, Drug
Abuse, Explicit Violence, Extremist Groups, Hacking, Illegal or
Unethical, Plagiarism, Proxy Avoidance, Malicious Websites,
Phishing, Spam URLs
118
Administration Guide
Fortinet Technologies Inc.
Event references
Event Monitor
Field
Description
Status
Name
Description
Devices
Select All Devices,select Specify and use the add icon to add devices.
Select Local FortiAnalyzer if the event handler is for local FortiAnalyzer
event logs.
Local FortiAnalyzer is available in the root ADOM only and is used to query
FortiAnalyzer event logs.
Severity
Select the severity from the drop-down list: Critical, High, Medium, Low.
Log Type
Select the log type from the drop-down list. The available options are:
Traffic Log, Event Log, Application Control, DLP, IPS, Virus, and Web Filter.
The Log Type is Event Log when Devices is Local FortiAnalyzer.
Event Category
Select the category of event that this handler will monitor from the dropdown list. The available options is dependent on the platform type.
This option is only available when Log Type is set to Traffic Log and
Devices is set to All Devices or Specify.
Group By
Add Filter
Log Field
Select a log field to filter from the drop-down list. The available options will
vary depending on the selected log type.
Match Criteria
Select a match criteria from the drop-down list. The available options will
vary depending on the selected log field.
Value
Either select a value from the drop-down list, or enter a value in the text
box. The available options will vary depending on the selected log field.
Delete
Select the delete icon, to delete the filter. A minimum of one filter is
required.
Enter a generic text filter. For more information on creating a text filter,
hover the cursor over the help icon.
Administration Guide
Fortinet Technologies Inc.
119
Event Monitor
120
Event references
Field
Description
Enter threshold values to generate alerts. Enter the number, in the first text
box, of each type of event that can occur in the number of minutes entered
in the second text box.
Select the checkbox to enable. Enter an email address in the To and From
text fields, enter a subject in the Subject field, and select the email server
from the drop-down list. Select the add icon to add an email server. For
information on creating a new mail server, see Mail servers on page 182.
Select the checkboxes to enable these feature. Select an SNMP community or user from the requisite drop-down list. Select the add icon to add
an SNMP community or user.
Select the checkbox to enable this feature. Select a syslog server from the
drop-down list. Select the add icon to add a syslog server. For information
on creating a new syslog server, see Syslog servers on page 183
Administration Guide
Fortinet Technologies Inc.
Reports
About reports
You can generate reports of data from logs by using Reports. You can use predefined reports. You can also
create customize reports. Predefined report templates, charts, and macros are available to help you create new
reports.
Report files are stored in the reserved space for the FortiAnalyzer device. See Disk fullness and automatic log
deletion on page 76.
When rebuilding the SQL database, Reports will not be available until after the rebuild
is completed. Select the Show Progress link in the message to view the status of the
SQL rebuild.
Predefined...
GUI Location
Purpose
Reports
Available for you to generate reports directly or with minimum setting configurations. Predefined reports are actually report templates with basic, default setting
configurations.
Report templates
Available for you to use directly or build upon. Report templates include charts and/or macros and specify the layout
of the report. A template populates the Layout tab of a
report that is to be created. See List of report templates
on page 142.
Administration Guide
Fortinet Technologies Inc.
121
Reports
About reports
Predefined...
GUI Location
Purpose
Charts
Macros
122
Administration Guide
Fortinet Technologies Inc.
Generating reports
Reports
Generating reports
Generating reports
You can generate reports by using one of the predefined reports or by using a custom report that you created. You
can find all the predefined reports and custom reports listed in Reports > Report Definitions > All Reports.
To generate a report:
1. Go to Reports > Report Definitions > All Reports.
2. In the content pane, select a report from the list.
3. (Optional) Click Edit in the toolbar and edit settings on the Settings and Layout tabs. For a description of the
fields in the Settings and Layout tabs, see Reports Settings tab on page 144 and Creating charts on page 131 and
Creating macros on page 135.
4. In the toolbar of the View Report tab, click Run Report.
Enabling auto-cache
You can enable auto-cache to reduce report generation time for reports that require a long time to assemble
datasets. For information about auto-cache and hcache, see How auto-cache works on page 122.
To enable auto-cache:
1. Go to Reports > Report Definitions > All Reports.
2. Select the report from the list, and click Edit in the tool bar.
3. In the Settings tab, select the Enable Auto-cache check box.
4. Click OK.
Grouping reports
If you are running a large number of reports which are very similar, you can significantly improve report generation
time by grouping the reports. Report grouping can reduce the number of hcache tables and improve auto-hcache
completion time and report completion time.
Administration Guide
Fortinet Technologies Inc.
123
Reports
Generating reports
Notes:
1. The report-like field is the name pattern of the report that will utilize the report-group feature. This string
is case-sensitive.
2. The group-by value controls how cache tables are grouped.
3. To see a list of reports that have been included in the grouping, enter the following CLIcommand:
execute sql-report list-schedule <ADOM>
Scheduling reports
You can configure a report to generate on a regular schedule.
124
Administration Guide
Fortinet Technologies Inc.
Creating reports
Reports
To schedule a report:
1. Go to Reports > Report Definitions > All Reports.
2. Select the report from the list, and click Edit in the tool bar.
3. On the Settings tab, select the Enable Schedule check box and configure the schedule.
4. Click OK.
Creating reports
You can create reports from report templates, by cloning and editing predefined/existing reports, or start from
scratch.
Administration Guide
Fortinet Technologies Inc.
125
Reports
Creating reports
5. Edit settings on the Settings tab. For a description of the fields, see Reports Settings tab on page 144.
6. Editing settings on the Layout tab.
For a description of the fields, see Reports Layouts tab on page 146.
7. Click OK.
126
Administration Guide
Fortinet Technologies Inc.
Creating reports
Reports
Top Image
Select the top image position from the drop-down menu. Select one of the
following: Right, Center, Left.
Text Color
Select the text color from the drop-down menu. Select one of the following:
Black, Bold Blue, Blue, Turquoise, Green, Bold Green, Yellow, Orange,
Red, Bold Red, Purple, White, Gray.
Report Title
Custom Text 1
Custom Text 2
Bottom Image
Edit the text printed in the left hand footer of the cover page.
Administration Guide
Fortinet Technologies Inc.
127
Reports
Managing reports
Edit the text printed in the left hand footer of the cover page. {default}
prints the report creation date and time.
Select the cover page footer background color from the drop-down list.
Select one of the following: Bold Blue, Blue, Turquoise, Green, Bold
Green, Yellow, Orange, Red, Bold Red, Purple, White, Gray,
Transparent.
Reset to Default
Managing reports
You can manage reports by going to Reports > Report Definitions > All Reports. Some options are available as
buttons on the toolbar. Some options are available in the right-click menu. Right-click a report to display the
menu.
Option
Description
Create New
Creates a new report. You can choose whether to base the new report on a
report template.
Edit
Delete
Clone
Run report
Generates a report.
Folder
Import Report
Export Report
128
Administration Guide
Fortinet Technologies Inc.
Reports
Text
Images
Tables
The datasets for charts and macros specify what data to use from Analytics logs when you generate the report.
You can also create custom charts and macros to use in report templates.
Administration Guide
Fortinet Technologies Inc.
129
Reports
For a description of the fields, see Reports Layouts tab on page 146. For information about creating charts
and macros, see Creating charts on page 131 and Creating macros on page 135.
6. Click OK.
The new template is now displayed on the template list.
130
Option
Description
Create New
Edit
Edit a report template. You can edit report templates that you created. You
cannot edit predefined report templates.
Administration Guide
Fortinet Technologies Inc.
Chart library
Reports
Option
Description
View
Displays the settings for the predefined report template. You can copy elements from the report template to the clipboard, but you cannot edit a predefined report template.
Delete
Deletes the selected report template. You can delete report templates that
you created. You cannot delete predefined report templates.
Clone
Rename
Renames the selected report template. You can rename report templates
that you created. You cannot rename predefined report templates.
Chart library
Creating charts
You can also create charts by using the Chart Builder that is available in Log View .
See Creating charts with Chart Builder on page 106.
To create charts:
1. Ensure you are in the correct ADOM, if using ADOMs. Otherwise, skip this step.
2. Go to Reports > Report Definitions > Chart Library.
3. Click Create New in the toolbar.
4. Configure the settings for the new chart. The following table provides a description for each setting.
Name
Administration Guide
Fortinet Technologies Inc.
131
Reports
Chart library
Description
Dataset
Select a dataset from the drop-down list. See Datasets on page 136 for
more information. The options will vary based on device type.
Resolve Hostname
Chart Type
Select a graph type from the drop-down list; one of: area, bar, donut, line,
pie, or table. This selection will affect the rest of the available selections.
Data Bindings
Data Binding: Select a value from the drop-down list. The available options
will vary depending on the selected dataset.
Label: Enter a label for the axis.
Add line
Lines
bar
132
X-Axis
Data Binding: Select a value from the drop-down list. The available options
will vary depending on the selected dataset.
Only Show First: Enter a numerical value. Only the first X items will be
displayed. Other items are bundled into the Others category.
Overwrite label: Enter a label for the axis.
Y-axis
Data Binding: Select a value from the drop-down list. The available options
will vary depending on the selected dataset.
Overwrite label: Enter a label for the axis.
Group By
Data Binding: Select a value from the drop-down list. The available options
will vary depending on the selected dataset.
Show Top: Enter a numerical value. Only the first X items will be
displayed. Other items can be bundled into the Others category.
Bundle rest
into
"Others"
Order By
Administration Guide
Fortinet Technologies Inc.
Chart library
Reports
Data Binding: Select a value from the drop-down list. The available options
will vary depending on the selected dataset.
Label: Enter a label for the axis.
Show Top: Enter a numerical value. Only the first X items will be
displayed. Other items can be bundled into the Others category.
Series
Data Binding: Select a value from the drop-down list. The available options
will vary depending on the selected dataset.
Format: Select a format from the drop-down list: Bandwidth, Counter,
Default, Percentage, or Severity
Label: Enter a label for the axis.
Bundle rest
into
"Others"
Table Type
Add Column
Columns
table
l
l
Order By
Select what to order the table by. The available options will vary depending
on the selected dataset.
Bundle rest
into
"Others"
Select to bundle the rest of the results into an Others category. This option
is not available for regular tables.
Show Top
Enter a numerical value. Only the first X items will be displayed. Other
items can be bundled into the Others category for Ranked and Drilldown
tables.
Drilldown
Top
Enter a numerical value. Only the first X items will be displayed. This
options is only available for Drilldown tables.
5. Click OK.
Administration Guide
Fortinet Technologies Inc.
133
Reports
Chart library
Managing charts
You can manage charts in Reports > Report Definitions > Charts Library. Some options are available as buttons
on the toolbar. Some options are available in the right-click menu. Right-click a chart to display the menu.
Option
Description
Create New
Edit
Edit a chart. You can edit charts that you created. You cannot edit predefined charts.
View
Displays the settings for the selected predefined chart. You cannot edit a
predefined chart.
Delete
Deletes the selected chart. You can delete charts that you create. You cannot delete predefined charts.
Clone
Import
Export
Show Predefined
Show Custom
Search
Lets you search for a chart by typing the chart name and pressing enter
134
Administration Guide
Fortinet Technologies Inc.
Macro library
Reports
Macro library
Creating macros
The FortiAnalyzer unit provides a selection of predefined macros. You can also create new macros, or clone and
edit existing macros.
Macros are predefined to use specific datasets and queries. They are organized into categories, and can be
added to, removed from, and organized in reports.
Macros are currently supported in FortiGate and FortiCarrier ADOMs only.
Description
Dataset
Select a dataset from the drop-down list.The options will vary based on
device type.
Query
Data Binding
The data bindings vary depending on the dataset selected. Select a data
binding from the drop-down list.
Display
4. Click OK. The newly created macro is shown in the Macro library.
Administration Guide
Fortinet Technologies Inc.
135
Reports
Datasets
Managing macros
You can manage macros by Reports >Libraries >Macro Library. Some options are available as buttons on the
toolbar. Some options are available in the right-click menu. Right-click a macro to display the menu.
Option
Description
Create New
Edit
Edit the selected macro. You can edit macros that you created. You cannot
edit predefined macros.
View
Displays the settings for the selected macro. You cannot edit a predefined
macro.
Delete
Deletes the selected macro. You can delete macros that you create. You
cannot delete predefined macros.
Clone
Show Predefined
Show Custom
Search
Lets you search for a macro by typing the chart name and pressing enter
Datasets
Creating datasets
FortiAnalyzer datasets are collections of data from logs for monitored devices. Charts and macros reference
datasets. When you generate a report, the datasets populate the charts and macros to provide data for the
report.
136
Administration Guide
Fortinet Technologies Inc.
Datasets
Reports
Predefined datasets for each supported device type are provided, and new datasets can be created and
configured.
Log Type
The following log types are available for FortiMail: Email Filter,
Event, History, and Virus.
The following log types are available for FortiWeb: Intrusion
Prevention, Event, and Traffic.
Query
Add Variable
Use the drop-down list to select a time period. When selecting Other, enter
the start date, time, end date, and time.
Devices
Select All Devices or Specify to select specific devices to run the SQL
query against. Click the Select Device button to add multiple devices to
the query.
Test
Select to test the SQL query before saving the dataset configuration.
4. Click Test.
The query results are displayed. If the query is not successful, an error message appears in the results pane.
5. Click OK.
Administration Guide
Fortinet Technologies Inc.
137
Reports
Output profiles
3. Hover the mouse cursor over the dataset on the dataset list. The SQL query is displayed as a tooltip.
You can also open the dataset to view the query in the Query field.
Validating datasets
We suggest you validate a dataset (especially a custom dataset) before using it in your report.
To validate a dataset:
1. Ensure you are in the correct ADOM, if using ADOMs. Otherwise, skip this step.
2. Go to Reports >Report Definitions > Datasets.
3. Select a dataset, and then click Validate in the toolbar.
Validation results are displayed in the Data Validation dialog box. If any error is detected, you can edit the dataset
in the dialog box and then click Save and Revalidate.
You can also click Validate All Custom in the toolbar to validate all the custom datasets.
Output profiles
Output profiles allow you to define email addresses to which generated reports are sent and provide an option to
upload the reports to FTP, SFTP, or SCP servers. Once created, an output profile can be specified for a report.
138
Administration Guide
Fortinet Technologies Inc.
Output profiles
Reports
Comments
Output Format
Select the format or formats for the generated report. You can choose from
PDF, HTML, XML, and CSV formats.
Subject
Body
Recipients
Select the email server from the drop-down list and enter to and from email
addresses.Select Add New to add another entry so that you can specify
multiple recipients.
Server Type
Server
User
Password
Directory
Select to delete the generated report after it has been uploaded to the
selected server.
Administration Guide
Fortinet Technologies Inc.
139
Reports
Report languages
Option
Description
Create New
Edit
Delete
Report languages
You can specify the language of reports when creating a report. You can add new languages, and you can change
the name and description of the languages. You cannot edit the predefined languages.
French
Japanese
Korean
Portuguese
Simplified Chinese
Spanish
Traditional Chinese
140
Administration Guide
Fortinet Technologies Inc.
Report calendar
Reports
Option
Description
Create New
View
Edit
Edit the selected report language. You cannot edit predefined report languages.
Delete
Delete the selected report language. You cannot delete predefined report
languages.
Report calendar
You can use the report calendar to view all the reports that are scheduled for the selected month. You can edit or
disable upcoming report schedules, as well as delete or download completed reports.
Administration Guide
Fortinet Technologies Inc.
141
Reports
Report references
3. Hover the mouse cursor over a calendar entry to display the name, status, and device type of the scheduled
report. You can double-click the calendar entry to go to the Settings tab of the report.
4. Click the left or right arrow at the top of the Report Calendar pane to change the month that is displayed. Click
Today to return to the current month.
In Report Calendar, right-click a past calendar entry, and select Delete or Download. The corresponding completed
report will be deleted or downloaded.
Note:You can only delete or download scheduled reports that have a status of Finished. You cannot delete
scheduled reports with a status of Pending.
Report references
List of report templates
FortiAnalyzer includes report templates that you can use as it is or build upon when you create a new report.
FortiAnalyzer provide different templates for different devices.
You can find report templates in the Reports >Report Definitions > Templates tree menu.
142
Administration Guide
Fortinet Technologies Inc.
Report references
Reports
Administration Guide
Fortinet Technologies Inc.
143
Reports
Report references
144
Field
Description
Time Period
The time period that the report will cover. Select a time period, or select
Other to manually specify the start and end date and time.
Devices
The devices that the report will include. Select either All Devices or Specify to add specific devices. Select the add icon to select devices.
Type
Enable Schedule
Enable Auto-Cache
Select to assemble datasets before generating the report and as the data is
available. This process uses system resources and is recommended only
for reports that require days to assemble datasets. Disable this option for
unused reports and for reports that require little time to assemble datasets.
Start time
End time
Enter an ending date and time for the file generation, or set it for never ending.
Enable Notification
Output Profile
Select the output profile from the drop-down list, or select Create New to
create a new output profile. See Output profiles on page 138.
Administration Guide
Fortinet Technologies Inc.
Report references
Reports
Field
Description
Select All to filter log messages based on all of the added conditions, or
select Any of the following conditions to filter log messages based on any
one of the conditions.
Add Filter
Select to add filters. For each filter, select the field, and operator from the
drop-down lists, then enter or select the values as applicable.
Filters vary based on device type.
LDAP Query
Select to add an LDAP query, then select the LDAP server and the case
change value from the drop-down lists.
Field
Description
Language
Select the report language. Select one of the following: Default, English,
French, Japanese, Korean, Portuguese, Simplified_Chinese, Spanish, or
Traditional_Chinese.
Print Orientation
Hide # Column
Layout Header
Enter header text and select the header image. The default image is
fortinet_logo.png.
Layout Footer
Select to print the report cover page. Select Customize to customize the
cover page. See Customizing report cover pages on page 126.
Select to print the device list. Select Compact, Count, or Detailed from the
drop-down list.
Administration Guide
Fortinet Technologies Inc.
145
Reports
Report references
Field
Description
Obfuscate User
Resolve Hostname
Color Code
The color used to identify the report on the calendar. Select a color code
from the drop-down list to apply to the report schedule. Color options
include: Bold Blue, Blue, Turquoise, Green, Bold Green, Yellow , Orange,
Red, Bold Red, Purple, and Gray.
Field
Description
Save as Template
Cut
To cut a text fragment, start with selecting it. When the text is selected,
you can cut it using one of the following methods:
l
Select the cut button in the toolbar
Copy
Paste
146
To cut a text fragment, start with selecting it. When the text is selected,
you can cut it using one of the following methods:
l
Select the cut button in the toolbar
l
Administration Guide
Fortinet Technologies Inc.
Report references
Reports
Field
Description
If you want to paste an already formatted text, but without preserving the
formatting, you can paste it as plain text. To achieve this, copy the formatted text and select the Paste as plain text button in the toolbar. If the
browser blocks the editor toolbar's access to clipboard, a Paste as Plain
Text dialog window will appear and you will be asked to paste the fragment
into the text box using the CTRL+V keyboard shortcut.
You can preserve basic formatting when you paste a text fragment from
Microsoft Word. To achieve this, copy the text in a Word document and
paste it using one of the following methods:
l
Select the Paste from Word button in the toolbar
l
Undo
Select to undo the last action. Alternatively, use the CTRL+Z keyboard
shortcut to perform the undo operation.
Redo
Select to redo the last action. Alternatively, use the CTRL+Y keyboard
shortcut to perform the redo operation.
Find
Select to find text in the report layout editor. Find consists of the following
elements:
l
Find what: Is the text field where you enter the word or phrase that
you want to find.
l
Administration Guide
Fortinet Technologies Inc.
147
Reports
Report references
Field
Description
Replace
Select to replace text in the report layout editor. Replace consists of the following elements:
l
Find what: Is the text field where you enter the word or phrase that
you want to find.
l
148
Replace with: Is the text field where you enter the word or phrase
that will replace the search term in the document.
Match case: Checking this option limits the search operation to
words whose case matches the spelling (uppercase and lowercase
letters) given in the search field. This means that the search
becomes case-sensitive.
Match whole word: Checking this option limits the search operation
to whole words.
Match cyclic: Checking this option means that after editor reaches
the end of the document, the search continues from the beginning
of the text. This option is checked by default.
Image
Select the Image button in the toolbar to insert an image into the report layout. Right-click an existing image to edit image properties.
Table
Select the Table button in the toolbar to insert a table into the report layout.
Right-click an existing table to edit a cell, row, column, table properties or
delete the table.
Link
Select the Link button in the toolbar to open the Link dialog window. You
can select to insert a URL, a link to an anchor in the text, or an email
address. Alternatively, use the CTRL+L keyboard shortcut to open the Link
dialog window.
Anchor
Select the Anchor button in the toolbar to insert an anchor in the report layout.
FortiAnalyzer Chart
FortiAnalyzer Macro
Paragraph Format
Select the paragraph format from the drop-down list. Select one of the following: Normal, Heading1, Heading2, Heading3, Heading4, Heading5,
Heading6, Formatted, or Address.
Administration Guide
Fortinet Technologies Inc.
Report references
Reports
Field
Description
Font Name
Select the font from the drop-down list. Select one of the following: Arial,
Comic Sans MS, Courier New, Georgia, Lucida Sans Unicode, Tahoma,
Times New Roman, Trebuchet MS, or Verdana.
Font Size
Select the font size from the drop-down list. Select a size ranging from 8 to
72.
Bold
Select the text fragment and then select the Bold button in the toolbar.
Alternatively, use the CTRL+B keyboard shortcut to apply bold formatting
to a text fragment.
Italic
Select the text fragment and then select the Italic button in the toolbar.
Alternatively, use the CTRL+I keyboard shortcut to apply italics formatting
to a text fragment.
Underline
Select the text fragment and then select the Underline button in the toolbar. Alternatively, use the CTRL+U keyboard shortcut to apply underline
formatting to a text fragment.
Strike Through
Select the text fragment and then select the Strike Through button in the
toolbar.
Subscript
Select the text fragment and then select the Subscript button in the toolbar.
Superscript
Select the text fragment and then select the Superscript button in the toolbar.
Text Color
You can change the color of text in the report by using a color palette. To
choose a color, select a text fragment and press the Text Color toolbar button. The Text Color drop-down menu that will open lets you select a color
from a basic palette of 40 shades.
If the color that you are after is not included in the basic palette, click the
More Colors option in the drop-down menu. The Select Color dialog window that will open lets you choose a color from an extended palette.
Background Color
Insert/Remove Numbered
List
Decrease Indent
Administration Guide
Fortinet Technologies Inc.
149
Reports
150
Report references
Field
Description
Increase Indent
To increase the indentation of the element, select the Increase Indent toolbar button. The block-level element containing the cursor will be indented
with one tabulator length.
Block Quote
Block quote is used for longer quotations that are distinguished from the
main text by left and right indentation. It is recommended to use this type
of formatting when the quoted text consists of several lines or at least 100
words.
Align Left
When you align your text left, the paragraph is aligned with the left margin
and the text is ragged on the right side. This is usually the default text alignment setting for the languages with left to right direction.
Center
When you center your text, the paragraph is aligned symmetrically along
the vertical axis and the text is ragged on the both sides. This setting is
often used in titles or table cells.
Align Right
When you align your text right, the paragraph is aligned with the right margin and the text is ragged on the left side. This is usually the default text
alignment setting for the languages with right to left direction.
Justify
When you justify your text, the paragraph is aligned with both left and right
margin; the text is not ragged on any side. Instead of this, additional spacing is realized through flexible amount of space between letters and words
that can stretch or contract according to the needs.
Remove Format
Administration Guide
Fortinet Technologies Inc.
System Settings
System Settings allows you to manage system options for your FortiAnalyzer unit.
Additional configuration options and short-cuts are available using the right-click
menu. Right-click the mouse on different navigation panes on the GUI page to access
these options.
Option
Description
Dashboard
All ADOMs
Available when administrative domains (ADOMs) are enabled. You can create, edit, and monitor all ADOMs. See Administrative Domains on page
43.
Storage Info
Displays information about how much FortiAnalyzer disk space has been
used for log storage. You can configure and monitor log storage settings.
See .
Network
Admin
Expand and collapse to display and hide access to the following administrator settings for FortiAnalyzer:
Administrators
Profile
Remote Auth
Server
Displays the configured remote authorization servers. See Remote authentication servers on page 56.
Admin Settings
Displays the global administrator settings. See Admin settings on page 63.
Certificates
Local Certificates
Administration Guide
Fortinet Technologies Inc.
Expand and collapse to display and hide access to the following certificate
settings:
View and manage local certificates. See Local Certificates on page 160.
151
System Settings
Option
Description
CACertificates
CRL
Log Forwarding
Fetcher Management
Event Log
Displays the event log for FortiAnalyzer. See FortiAnalyzer event log on
page 170.
Task Monitor
Displays the task monitor for FortiAnalyzer. See FortiAnalyzer task monitor
on page 173.
Advanced
Expand and collapse to display and hide access to the following advanced
settings:
SNMP
Mail Server
Syslog Server
Meta Fields
Displays options for meta fields. See Meta fields on page 183.
Displays device log settings. See Configuring rolling and uploading of logs
on page 84.
File Management
Displays global automatic deletion settings. See Configuring global automatic deletion on page 83.
Advanced Settings
Displays advanced settings, such as changing the ADOM mode, downloading the WSDLfile, and specifying the size of the task list. See WSDL
files on page 184.
152
Administration Guide
Fortinet Technologies Inc.
System Settings
Widget
Description
System Information
System Resources
Displays the real-time and historical usage status of the CPU, memory, and
hard disk. For more information, see Viewing CPUstatus on page 157.
License Information
Displays the devices being managed by the FortiAnalyzer unit and the maximum numbers of devices allowed. For more information, see .
From this widget you can manually upload a license for FortiAnalyzer VM
systems.
Unit Operation
Displays status and connection information for the ports of the FortiAnalyzer unit. It also enables you to shutdown and restart the FortiAnalyzer unit
or reformat a hard disk. For more information, see Viewing port status on
page 157.
CLI Console
Administration Guide
Fortinet Technologies Inc.
153
System Settings
Widget
Description
Displays log-based alert messages for both the FortiAnalyzer unit itself and
connected devices. For more information, see Viewing and updating
FortiAnalyzer firmware on page 155.
Displays a real-time monitor of logs received. You can select to view data
per device or per log type. See Viewing the number of logs being received
on page 158.
Displays how many seconds the database is behind in processing the logs.
Click the edit icon in the widget toolbar to adjust the time and refresh intervals shown on the graph.
Disk I/O
Displays the disk utilization, transaction rate, or throughput as a percentage over time.
Click the edit icon in the widget toolbar to select which chart is displayed,
the time period shown on the graph (last 1 hour, 8 hours, or 24 hours), and
the refresh interval (5 - 240 seconds, 0 to disable) of the chart.
154
Action
Steps
Move a widget
Move the widget by clicking and dragging its title bar, then dropping it in its new location
Add a widget
Select Toggle Widgets from the toolbar, then select the name widget you need to
add.
Delete a widget
Customize a widget
(Edit) icon, you can customize the view by clicking the Edit
Administration Guide
Fortinet Technologies Inc.
System Settings
Action
Steps
Select Toggle Widgets > Reset to Default from the toolbar. The dashboards will be
reset to the default view.
Administration Guide
Fortinet Technologies Inc.
155
System Settings
Type Yes.
2. After the system reboots, log in to the FortiAnalyzerGUI. FortiManager features except FortiGuard have been
enabled.
After FortiManager features are enabled, you can upgrade the management license so that your FortiAnalyzer
unit can manage up to 20 FortiGate devices.
156
Administration Guide
Fortinet Technologies Inc.
System Settings
You can disable the FortiManager features on your FortiAnalyzer at any time, by using GUIor CLI.
Type Yes.
Viewing CPUstatus
The System Resources widget displays the usage status of the CPUs, memory, and hard disk. You can view
system resource information in real-time or historical format, as well as average or individual CPU usage.
To toggle between real-time and historical data, click Edit in the widget toolbar, select Historical or Real-time,
edit the other settings as required, then click OK.
To view individual CPU usage, from the Real-Time display, click on the CPU chart. To go back to the standard
view again, click the chart again.
Administration Guide
Fortinet Technologies Inc.
157
System Settings
Click Edit from the widget toolbar to view the Alert Message Console Settings, where you can adjust the number
of entries that are visible in the widget, and the refresh interval.
To view a complete list of alert messages click Show More from the widget toolbar. The widget will show the
complete list of alerts. To clear the list, click Delete All Messages. Click Show Less to return to the previous
view.
158
Administration Guide
Fortinet Technologies Inc.
System Settings
The date and time according to the FortiAnalyzer units clock at the time
that this tab was loaded or when you last clicked the Refresh button.
Time Zone
Select the time zone in which the FortiAnalyzer unit is located and whether
or not the system automatically adjusts for daylight savings time.
Update Time By
Select Set time to manually set the time, or Synchronize with NTP Server
to automatically synchronize the time.
Set Time
Set the date from the calendar or by manually entering it in the format:
YYY/MM/DD.
Select Time
Sync Interval
Enter how often, in minutes, that the device should synchronize its time
with the NTP server. For example, entering 1440 causes the Fortinet unit
to synchronize its time once a day.
Server
Enter the IP address or domain name of an NTP server. Click the plus icon
to add more servers. To find an NTP server that you can use, go to
http://www.ntp.org.
The System Information widget and the get system status CLI command will display the full host name. If
the host name is longer than 16 characters, the CLI and other places display the host name in a truncated form
ending with a tilde (~) to indicate that additional characters exist, but are not displayed. For example, if the host
name is Fortinet1234567890, the CLI prompt would be Fortinet123456~#.
Administration Guide
Fortinet Technologies Inc.
159
System Settings
Local Certificates
For information about the available CLI commands, see the FortiAnalyzer CLI Reference.
When using the CLI Console you are logged in under the same administrator account that you used to access the
GUI. You can enter commands by typing them, or you can copy and paste commands in to or out of the console.
Click Detach in the widget toolbar to open the widget in a separate window.
Local Certificates
The FortiAnalyzer unit generates a certificate request based on the information you enter to identify the
FortiAnalyzer unit. After you generate a certificate request, you can download the request to a computer that has
management access to the FortiAnalyzer unit and then forward the request to a CA.
The certificate window also enables you to export certificates for authentication, importing, and viewing.
The FortiAnalyzer has one default local certificate: Fortinet_Local.
160
Option
Description
Create New
Delete
Import
Import a certificate.
Download
Administration Guide
Fortinet Technologies Inc.
Local Certificates
System Settings
Subject Information
Select and then enter the ID Type (Host IP, Domain Name, or Email).
Optional Information
Organization Unit
(OU)
Organization (O)
Locality (L)
State/Province
(ST)
Country (C)
Select the country where the unit is installed from the drop-down list.
E-mail Address
(EA)
Subject
Alternative Name
Optionally, enter one or more alternative names for which the certificate is
also valid. Separate names with a comma.
A name can be:
l
e-mail address
l
IP address
URI
l
directory name (alternatives to the Distinguished Name)
You must precede the name with the name type.
Key Type
Key Size
Select the key size from the drop-down list: 512 Bit, 1024 Bit, 1536 Bit, or
2048 Bit. Only available when the key type is RSA.
Curve Name
Select the curve name from the drop-down list: secp256r1, secp384r1, or
secp521r1. Only available when the key type is Elliptic Curve.
Enrollment Method
4. Select OK to save the certificate request.. The request is sent and the status is listed as pending.
Administration Guide
Fortinet Technologies Inc.
161
System Settings
CA Certificates
CA Certificates
The FortiAnalyzer has one default CA certificate, Fortinet_CA. In this sub-menu you can delete, import, view, and
download certificates.
Importing CA certificates
To import a CA certificate:
1. Go to System Settings > Certificates > CACertificates.
2. Select Import in the toolbar. The Import dialog box opens.
3. Select Browse..., browse to the location of the certificate, and select OK.
162
Administration Guide
Fortinet Technologies Inc.
System Settings
Downloading CAcertificates
To download a CA certificate:
1. Go to System Settings> Certificates> CA Certificates.
2. Select the certificate or certificates that you would like to download, select Download in the toolbar, and save the
certificate to the management computer.
Deleting CAcertificates
To delete a CA certificate or certificates:
1. Go to System Settings > Certificates > CACertificates.
2. Select the certificate or certificates that you would like to delete and select Delete in the toolbar.
3. Select OK in the confirmation dialog box to delete the selected certificate or certificates.
Administration Guide
Fortinet Technologies Inc.
163
System Settings
Log Forwarding
Importing a CRL
To import a CRL:
1. Go to System Settings > Certificates > CRL.
2. Select Import in the toolbar. The Import dialog box opens.
3. Select Browse..., browse to the location of the CRL, then select OK to import it.
Viewing a CRL
To view a CRL:
1. Go to System Settings > Certificates > CRL.
2. Select the CRL that you would like to see details about, then select View Certificate Detail in the toolbar. The
Result page opens.
3. When you are finished viewing the CRL details, select OK to return to the CRL list.
Deleting a CRL
To delete a CRL or CRLs:
1. Go to System Settings > Certificates > CRL.
2. Select the CRL or CRLs that you would like to delete and select Delete in the toolbar.
3. Select OK in the confirmation dialog box to delete the selected CRL or CRLs.
Log Forwarding
You can forward logs from a FortiAnalyzer unit to another FortiAnalyzer unit, a syslog server, or a Common Event
Format (CEF) server.
The FortiAnalyzer unit that forwards logs to another unit or server plays the role of the client, and the
FortiAnalyzer unit, syslog server, or CEFserver that receives logs plays the role of the server.
In addition to forwarding logs to another unit or server, the FortiAnalyzer unit that forwards logs retains a local
copy of the logs. The local copy of logs are subject to the data policy settings for Archive logs on the FortiAnalyzer
unit. See also Log storage on page 20.
Modes
FortiAnalyzer supports the following log forwarding modes.
Real-time
164
Administration Guide
Fortinet Technologies Inc.
Log Forwarding
System Settings
Logs are forwarded as they are received. FortiAnalyzer supports real-time log forwarding to another FortiAnalyzer
unit, a syslog server, or a CEFserver. Content files, which include DLP (data leak prevention) files, antivirus
quarantine files, and IPS (intrusion prevention system) packet captures, are NOTforwarded.
Real-time mode is the default mode.
Aggregation
As FortiAnalyzer receives logs from devices, it stores them, and then forwards the logs at a specified time
everyday. In this mode, content files are also forwarded daily at the scheduled time.
FortiAnalyzer supports log forwarding in aggregation mode only between two FortiAnalyzer units. Syslog and
CEFservers are not supported.
Mixed (Both)
Logs are forwarded in real-time, while content files are forwarded in aggregation at a specified time daily.
For both Aggregation and Mixed modes, the client needs to provide the login credentials of an administrator account of the server with a Super_User profile to get
authenticated by the server to forward logs.
Administration Guide
Fortinet Technologies Inc.
165
System Settings
Log Forwarding
166
Name
Select the type of remote server to which you are forwarding logs.
FortiAnalyzer, Syslog, or Common Event Format (CEF).
Server IP
Server Port
Enter the server port. When Remote Server Type is FortiAnalyzer, you
cannot change the port. The default port 514 is used.
Administration Guide
Fortinet Technologies Inc.
System Settings
Reliable Connection
Click Select Device and then add devices for which to forward logs.
Log Filters
Toggle the switch on to filter the logs that are forwarded in real-time. Add a
filter by completing the Log Field, Match Criteria, and Value options.
Enable
Exclusions
The client will forward logs in realtime mode by default. You can change the mode in
CLI. See Configuring log forwarding mode in CLI on page 165.
3. Click OK.
The client starts to forward logs to the server. If real-time forwarding has been configured, you can check the
forwarded logs on the server side immediately.
Administration Guide
Fortinet Technologies Inc.
167
System Settings
Server IP
User
Password
Note: The fetch server administrator must have a Standard_User or Super_User profile to authenticate
fetch requests.
4. Click OK.
168
Name
Displays the name of the fetch server that you have specified.
Server IP
Displays the IPaddress of the fetch server that you have specified.
User
Displays the username of the fetch server administrator that you have
provided.
Secure Connection
Enable this to use SSLconnection to transfer fetched logs from the server.
Server ADOM
Select a server ADOM from the drop-down list, from which the client will
fetch logs. You can select one server ADOM at a time.
Local ADOM
Specify the client ADOM to which the logs will be sent. Select an existing
ADOMfrom the drop-down list, or create a new ADOM by typing the new
ADOMname in the field.
Administration Guide
Fortinet Technologies Inc.
System Settings
Devices
Add the devices of which the client will fetch logs. Click Select Device,
(search and) select the devices, and click OK.
Enable Filters
You can filter the logs to fetch by enabling and adding log filters.
Time Period
Maximum devices
You can add up to 256 devices when creating a fetch profile. If you add more than 256
devices, the system will give an error message and the fetch profile cannot be created.
Data policy
If you are fetching logs to an existing local ADOM, make sure the ADOMhas enough
disk space for the upcoming logs. You also need to ensure that the data policy for the
local ADOMsupports fetching logs of the specified time period. That is, it keeps both
Archive and Analytics logs long enough so that the fetched logs will not be deleted
according to the policy.
For example, today is June 1, and the data policy of the local ADOM keeps Analytics
logs for 30 days (May 1 - May 30). You want to fetch logs for April 1 - 8. Ensure that the
data policy for the ADOMretains Analytics and Archive logs for at least 62 days, which
covers 31 days (May) + 30 days (April) +1 day (June 1). Otherwise, the fetched logs will
be automatically deleted after you fetch them.
3. Click Request Fetch.
The fetch request is sent to the fetch server. You can view the request in the Sessions tab.
To sync devices:
l
In the Profiles tab, select the fetch server profile, and click Sync Devices.
Once the sync is completed, you can verify the device and/or ADOM changes on the client. For example, you can
find the newly added devices in the specified ADOM.
If a new ADOMis created, the new ADOMwill mirror the disk space and data policy of
the corresponding server ADOM. If there is not enough space on the client, the client
will create an ADOMwith the maximum allowed disk space and give a warning message. You can then adjust disk space allocation if you want.
Administration Guide
Fortinet Technologies Inc.
169
System Settings
170
Administration Guide
Fortinet Technologies Inc.
System Settings
Date Time
The date and time that the log file was generated.
Level
User
Administration Guide
Fortinet Technologies Inc.
Information
Notification
Warning
Error
Critical
Alert
Emergency
User information.
171
System Settings
Sub Type
HA event
FortiAnalyzer event
FIPS-CC event
172
Add Filter
Filter the event log list based on the log level, user, sub type, or message.
Download
Click on Raw Log to view the logs in their raw state. Click Formatted Log to
view them in the formatted into a table.
Historical Log
View
View the selected log file. This option is only available when viewing historical event logs.
Delete
Delete the selected log file. This option is only available when viewing historical event logs.
Administration Guide
Fortinet Technologies Inc.
System Settings
Clear
Clear the selected file of logs. This option is only available when viewing
historical event logs.
Type
Select the type from the drop down list. This option is only available when
viewing historical logs.
Select one of the following: Event Log, FDS Upload Log, or FDS Download Log.
l FDS Upload Log: Select the device from the drop-down list.
l
Search
Pagination
FDS Download Log: Select the service (FDS, or FCT) from the Service
drop-down list, select the event type (All Event, Push Update, Poll
Update, or Manual Update) from the Event drop-down list, and then click
Go to browse logs.
Enter a search term to search the historical logs. This option is only available when viewing historical event logs.
Use these page options to browse logs and adjust how many logs are
shown per page.
Administration Guide
Fortinet Technologies Inc.
173
System Settings
Source
The platform from where the task is performed. Click the expand arrow to
view details of the specific task and access the history button.
Description
The nature of the task. Click the arrow to display the specific actions taken
under this task.
User
Status
The status of the task (hover over the icon to view the description):
l
Done: Completed with success.
l
Pending
Warning
Start Time
ADOM
History
Deleting tasks
You can remove a selected task or tasks from the list. Select the task or tasks, click Delete in the toolbar, then
click OKin the confirmation dialog box.
174
Administration Guide
Fortinet Technologies Inc.
SNMP
System Settings
SNMP
You can enable SNMPagent on FortiAnalyzer so that FortiAnalyzer can send traps to and receive queries from
the computer that you designate as its SNMPmanager. In this way, you can monitor your FortiAnalyzer with an
SNMPmanager.
Description
Location
Type the location of this FortiAnalyzer system to help find it in the event it
requires attention.
Contact
Type the contact information for the person in charge of this FortiAnalyzer
system.
3. Configure SNMPv1/v2c communities. See Configuring SNMP v1/v2c communities on page 176.
4. Configure SNMPv3 users. See Configuring SNMP v3 users on page 178.
Administration Guide
Fortinet Technologies Inc.
175
System Settings
SNMP
Name
176
Administration Guide
Fortinet Technologies Inc.
SNMP
System Settings
Hosts
The list of hosts that can use the settings in this SNMP community to
monitor the FortiAnalyzer system.
When you create a new SNMP community, there are no host entries.
Selecting Add creates an entry that broadcasts the SNMP traps and
information to the network connected to the specified interface.
IP Address
Interface
Select the name of the interface that connects to the network where this
SNMP manager is located from the drop-down list. You need to do this if
the SNMP manager is on the Internet or behind a router.
Delete
Add
Select to add a new default entry to the Hosts list that you can edit as
needed. You can have up to eight SNMP manager entries for a single
community.
Queries
Type the port number (161 by default) that the FortiAnalyzer system uses
to send v1 and v2c queries to the FortiAnalyzer in this community. Enable
queries for each SNMP version that the FortiAnalyzer system uses.
Traps
Type the Remote port number (162 by default) that the FortiAnalyzer
system uses to send v1 and v2c traps to the FortiAnalyzer in this
community. Enable traps for each SNMP version that the FortiAnalyzer
system uses.
SNMP Event
Enable the events that will cause the FortiAnalyzer unit to send SNMP
traps to the SNMPmanager:
l
Interface IP changed
Administration Guide
Fortinet Technologies Inc.
CPU Overuse
Memory Low
System Restart
Log Alert
Log Rate
Data Rate
177
System Settings
SNMP
User Name
Security Level
178
No Authentication, No Privacy
Authentication, No Privacy: Select the authentication algorithm
(SHA1, MD5) and enter the password.
Authentication, Privacy: Select the authentication algorithm
(SHA1, MD5), the private algorithm (AES, DES), and enter the
password.
Queries
Select to enable queries then enter the port number. The default port is
161.
Notification Hosts
The IP address or addresses of the host. Click the add icon to add multiple
IP addresses.
Administration Guide
Fortinet Technologies Inc.
SNMP
SNMP Event
System Settings
Enable the events that will cause the FortiAnalyzer unit to send SNMP
traps to the SNMPmanager.
FortiAnalyzer SNMP events:
l
Interface IP changed
l
CPU Overuse
Memory Low
System Restart
Log Alert
Log Rate
Data Rate
SNMP MIBs
The Fortinet and FortiAnalyzer MIBs, along with the two RFC MIBs, can be obtained from Customer Service &
Support (https://support.fortinet.com). You can download the FORTINET-FORTIMANAGERFORTIANALYZER-MIB.mib MIB file in the firmware image file folder. The FORTINET-CORE-MIB.mib file is
located in the main FortiAnalyzer 5.00 file folder.
To be able to communicate with the SNMP agent, you must include all of these MIBs into your SNMP manager.
Generally your SNMP manager will be an application on your local computer. Your SNMP manager might already
include standard and private MIBs in a compiled database that is ready to use. You must add the Fortinet and
FortiAnalyzer proprietary MIBs to this database.
Description
FORTINET-CORE-MIB.mib
FORTINETFORTIMANAGER-MIB.mib
The Fortinet SNMP agent supports MIB II groups with the following exceptions.
l
No support for the EGP group from MIB II (RFC 1213, section 3.11
and 6.10).
l
Administration Guide
Fortinet Technologies Inc.
179
System Settings
SNMP
Description
RFC-2665 (Ethernet-like
MIB)
The Fortinet SNMP agent supports Ethernet-like MIB information with the
following exception.
No support for the dot3Tests and dot3Errors groups.
SNMP traps
Fortinet devices share SNMP traps, but each type of device also has traps specific to that device. For example
FortiAnalyzer units have FortiAnalyzer specific SNMP traps. To receive Fortinet device SNMP traps, you must
load and compile the FORTINET-CORE-MIB into your SNMP manager.
Traps sent include the trap message as well as the unit serial number (fnSysSerial) and host name (sysName).
The Trap Message column includes the message included with the trap as well as the SNMP MIB field name to
help locate the information about the trap. To view a trap or querys name, object identifier (OID), and
description, open its MIB file in a plain text editor.
Trap message
Description
CPU usage exceeds the set percent. This threshold can be set in the
CLI using the following commands:
config system snmp sysinfo
set trap-high-cpu-threshold <percentage value>
end
CPU usage excluding NICE pro- CPU usage excluding NICE processes exceeds the set percentage.
cesses (fmSysCpuUsageExThis threshold can be set in the CLI using the following commands:
config system snmp sysinfo
cludedNice)
set trap-cpu-high-exclude-nice-threshold
<percentage value>
end
Memory low
(fnTrapMemThreshold)
180
Log disk usage has exceeded the configured threshold. Only available
on devices with log disks.
A temperature sensor on the device has exceeded its threshold. Not all
devices have thermal sensors. See manual for specifications.
Administration Guide
Fortinet Technologies Inc.
SNMP
System Settings
Trap message
Description
Power levels have fluctuated outside of normal levels. Not all devices
have voltage monitoring instrumentation.
Interface IP change
(fnTrapIpChange)
MIB field
Description
fnSysSerial
Administrator accounts:
MIB field
Description
fnAdminNumber
fnAdminTable
Table of administrators.
fnAdminIndex
fnAdminName
fnAdminAddr
fnAdminMask
Custom messages:
MIB field
Description
fnMessages
Administration Guide
Fortinet Technologies Inc.
181
System Settings
Mail servers
MIB field
Description
fmModel
Mail servers
Go to System Settings > Advanced > Mail Server to configure SMTP mail server settings. Mail servers can be
added, edited, deleted, and tested.
If an existing mail server is set in an Event Handler configuration, the delete icon is
removed and the mail server entry cannot be deleted.
Mail Server
Enter the SMTP server port number. The default port is 25.
Enable Authentication
Email Account
Password
182
Administration Guide
Fortinet Technologies Inc.
Syslog servers
System Settings
If the test is successful, an email will be sent to the entered email address. If the test fails, adjust the server's
settings then perform a retest.
Syslog servers
Go to System Settings > Advanced > Syslog Server to configure syslog mail server settings. Syslog servers can
be added, edited, deleted, and tested.
If an existing syslog server is set in an Event Handler configuration, the delete icon is
removed and the syslog server entry cannot be deleted.
Port
Enter the syslog server port number. The default port is 514.
Meta fields
Meta fields allow administrators to add extra information when configuring, adding, or maintaining FortiGate
units. You can make the fields mandatory or optional, and set the length of the field.
With the fields set as mandatory, administrators must supply additional information when they create a new
FortiGate object, such as an administrator account or firewall policy. Fields for this new information are added to
the FortiGate unit dialog boxes in the locations where you create these objects. You can also provide fields for
optional additional information.
Administration Guide
Fortinet Technologies Inc.
183
System Settings
WSDL files
Option
Description
Create New
Edit
Delete
The system object to which this metadata field applies. Select either
Devices, Device Groups, or Administrative Domains.
Name
Length
Select the maximum number of characters allowed for the field from the
drop-down list: 20, 50, or 255.
Importance
Status
WSDL files
You can download Web Services Definition Language (WSDL) files.
Web services is a standards-based, platform independent, access method for other hardware and software
application programming interfaces (APIs). The file itself defines the format of commands the FortiAnalyzer unit
will accept, as well as the response to expect. Using the WSDL file, third-party or custom applications can
184
Administration Guide
Fortinet Technologies Inc.
System Settings
communicate with the FortiAnalyzer unit and operate it or retrieve information, just as an admin user would from
the GUI or CLI.
Downloading WSDLfiles
To download WSDLfiles:
1. Go to the SystemSettings> Advanced> AdvancedSettings .
2. Select the required WSDL functions.
When you select Legacy Operations, no other options can be selected.
3. Click the Download button to download the WSDL file to your management computer.
3. If you want to encrypt the backup file, select the Encryption check box, then enter and confirm the password you
want to use.
4. Select OK and save the backup file on your management computer.
Administration Guide
Fortinet Technologies Inc.
185
System Settings
Select Browse... to find the configuration backup file you want to restore
on your management computer.
Password
Select the check box if you need to overwrite the current IP and routing
settings.
186
Administration Guide
Fortinet Technologies Inc.
Traffic varies by enabled options and configured ports. Only default ports are listed.
Functionality
Port(s)
DNS lookup
UDP 53
FDN connection
TCP 443
NTP synchronization
UDP 123
SNMP traps
UDP 162
UDP 514
If a secure connection has been configured between
a FortiGate device and a FortiAnalyzer device, syslog traffic will be sent into an IPsec tunnel. Data will
be exchanged over UDP 500/4500, Protocol IP/50.
TCP 21 or TCP 22
TCP 25
RADIUS authentication
TCP 1812
TACACS+ authentication
TCP 49
TCP 3000
TCP 514
Administration Guide
Fortinet Technologies Inc.
187
188
Functionality
Port(s)
UDP 514
If a secure connection has been configured between
a FortiGate and a FortiAnalyzer, syslog traffic will be
sent into an IPsec tunnel. Data will be exchanged
over UDP 500/4500, Protocol IP/50.
TCP 22
TCP 23
TCP 80
TCP 443
TCP 514
TCP 2032
TCP 3000
Web Service
TCP 8080
Ping
ICMP protocol
Administration Guide
Fortinet Technologies Inc.
Copyright 2016 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard, and certain other marks are registered trademarks of Fortinet,
Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company
names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and
actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein
represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written
contract, signed by Fortinets General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified
performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For
absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinets internal lab tests. In no event does Fortinet make any
commitment related to future deliverables, features or development, and circumstances may change such that any forward-looking statements herein are not accurate.
Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify,
transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.