Fortinet 3.0 MR7 Network Card User Manual


 
FortiAnalyzer Version 3.0 MR7 Administration Guide
168 05-30007-0082-20080908
File Explorer Tools
To view a vulnerability scan report
1 Go to Tools > Vulnerability Scan > Report.
2 To view the report in HTML format, in the Job Name column, select the name of
the report.
3 To view the report in PDF or MSWord (RTF) format, in the Formats column, select
the name of the file format.
If you configured the vulnerability scan report output options to include other file
formats, you can also view the report in those file formats.
Vulnerability scan reports contain results based upon port scans, software
fingerprinting, and tests performed by vulnerability scan modules; the accuracy of
these assessments depends on proper preparation of the network, RVS modules,
and target hosts, and is subject to the limitations of the FortiAnalyzer unit’s access
to the target host. For more information about minimizing the number of false
negative or false positive results, see “Preparing for the vulnerability scan job” on
page 157.
File Explorer
The File Explorer menu allows administrators to view and browse through the files
on their FortiAnalyzer unit. To view and browse through these files, go to Tools >
File Explorer.
In Tools > File Explorer, you can browse through what logs are stored on the
FortiAnalyzer unit. The files have a two main directories: drive0/private and
Storage. The Storage directory contains all information that is considered storage
on the FortiAnalyzer unit, such as log files and local log files.
You can expand and hide the two main directories as well as sub-directories by
selecting the plus or minus signs, located beside each main and sub-directory file
name.
End Time The time the FortiAnalyzer unit completed the vulnerability scan
job.
Formats Select to view the vulnerability scan report in a file format other
than HTML, if any.
In addition to HTML, the generated vulnerability scan reports may
also be available in PDF and MSWord (RTF) formats, depending
on your output configuration. For more information about on
setting output options, see “Configuring vulnerability scan jobs” on
page 162.
Action Select Delete to remove the report.