Fortinet FortiLog-400 Network Card User Manual


 
Contents
FortiLog Administration Guide 05-16000-0082-20050115 5
Reports ................................................................................................................. 57
Creating and generating a report...................................................................................... 57
Configuring report parameters ...................................................................................... 58
Configuring a report query ............................................................................................ 59
Creating a query profile............................................................................................. 60
Selecting the devices for the report .............................................................................. 60
Creating a device profile ........................................................................................... 61
Select filtering options................................................................................................... 61
Creating a filter profile............................................................................................... 62
Setting a report schedule .............................................................................................. 62
Creating a report schedule profile ............................................................................. 63
Choosing the report destination and format.................................................................. 63
Creating a report destination and format profile........................................................ 64
Reports on demand ...................................................................................................... 64
Viewing reports ................................................................................................................. 65
Roll up report ................................................................................................................ 66
Individual reports........................................................................................................... 66
Vulnerability reports .......................................................................................................... 67
Creating and generating a report .................................................................................. 67
Selecting report result parameters................................................................................ 68
Selecting plug-ins.......................................................................................................... 68
Creating a plug-in profile........................................................................................... 69
Selecting the scan targets for the report ....................................................................... 69
Creating a scan target profile.................................................................................... 70
Choosing the report destination and format.................................................................. 71
Creating a report destination and format profile........................................................ 71
Viewing the vulnerability report ..................................................................................... 72
Using Logs ........................................................................................................... 73
The Log view interface...................................................................................................... 74
Viewing logs...................................................................................................................... 74
Finding log information.................................................................................................. 75
Importing log files.............................................................................................................. 77
Log Search........................................................................................................................ 78
Log watch (Active mode) .................................................................................................. 78
Event correlation (Active mode)........................................................................................ 79
Using the FortiLog unit as a NAS....................................................................... 81
Connecting to the FortiLog file system.............................................................................. 81
Providing access to the FortiLog hard disk....................................................................... 82
Selecting a file sharing protocol .................................................................................... 82
Adding and modifying user accounts ............................................................................ 82