Filtering messages
You can apply filters to the message list. Filters are not case-sensitive by default. If available, select Tools > Case Sensitive Search to create case-sensitive filters.
Filtering messages using filters in the toolbar
- Go to the appropriate Log View.
- In the toolbar, make other selections, such as devices and time period.
- From the More dropdown, you can toggle between a Case Sensitve Search and a Case Insensitive Search.
- In the table header, click the settings icon to select the available columns in the table.
When a column is added, it is automatically added in the sequence displayed in the list. The added column is highlighted in the table when added for reference. You can drag and drop the columns to rearrage their display order.
- In the search bar, add filters for the table:
Toggling between Filter Mode and Text Mode
From the dropdown next to the search bar, select Filter Mode or Text Mode. The filter criteria is maintained when toggling between the modes. See below for more information about these modes.
Filter Mode
Click Add Filter to select a filter from the dropdown list. Then select an operator (=, !=, <, >, >=, <=, ~, or !~) and a value for the filter; you can begin typing a value to select it from the list. Click Apply to add the filter.
Click the Add Filter again to add another filter. It will be added with an
ANDrelationship to the previous filter; click the AND totoggle betweenAND(all filters are met) andOR(one of the filters are met).When adding a filter, only displayed columns are available in the dropdown list. To add more columns, click the settings icon in the table header.
Text Mode
In text mode search, enter the search criteria (log field names, operators, and values).
Remove filters
After entering filters, you can click the "x" at the left side of the search bar to remove the filters.
Search operators and syntax
Click the help icon at the right end of the Add Filter box to view search operators and syntax. See also Filter search operators and syntax.
CLI string “freestyle” search
Searches the string within the indexed fields configured using the CLI command:
config ts-index-field.For example, if the indexed fields have been configured using these CLI commands:
config system sql
config ts-index-field
edit "FGT-traffic"
set value "app,dstip,proto,service,srcip,user,utmaction"
next
end
end
Then if you type “
Skype” in the Add Filter box, FortiAnalyzer searches for “Skype” within these indexed fields:app,dstip,proto,service,srcip,userandutmaction.You can combine freestyle search with other search methods, for example:
Skype user=David.
UUID logging must be enabled in FortiGate/FortiOS to filter FortiGate traffic logs by object name, including
Source ObjectandDestination Object. See the FortiGate/FortiOS Administration Guide for more information about UUID logging.
Filtering messages using the right-click menu
In the log message table view, right-click an entry to select a filter criteria from the menu. Depending on the column you right-clicked, Log View uses the column value as the filter criteria. This context-sensitive filter is only available for certain columns.
You can perform the following filter actions from the right-click menu:
-
Add a filter entry with an AND condition, such as
AND event_type=traffic -
Add a filter entry with an AND negate condition, such as
AND event_type!=traffic -
Add a filter entry with an OR condition, such as
OR event_type=traffic -
Add a filter entry with an OR negate condition, such as
OR event_type!=traffic -
Replace all filters with the selected entry, such as
event_type=utm -
Replace all filters with the selected negate, such as
event_type!=utm
If no filter is used before right-click filtering, the new filter will be added no matter which option is selected in the right-click menu.
|
|
To see log field name of a filter/column, right-click the column of a log entry and select a context-sensitive filter. The Add Filter box shows log field name. Context-sensitive filters are available for each log field in the log details pane. See Viewing message details. |
Filtering messages using smart action filters
For Log View windows that have an Action column, the Action column displays smart information according to policy (log field action) and utmaction (UTM profile action).
The Action column displays a green checkmark Accept icon when both policy and UTM profile allow the traffic to pass through, that is, both the log field action and UTM profile action specify allow to this traffic.
The Action column displays a red X Deny icon and the reason when either the log field action or UTM profile action deny the traffic.
If the traffic is denied due to policy, the deny reason is based on the policy log field action.
If the traffic is denied due to UTM profile, the deny reason is based on the FortiView threattype from craction. craction shows which type of threat triggered the UTM action. The threattype, craction, and crscore fields are configured in FortiGate in Log & Report. For more information, see the FortiOS - Log Message Reference in the Fortinet Document Library.
A filter applied to the Action column is always a smart action filter.
|
|
The smart action filter uses the FortiGate UTM profile to determine what the Action column displays. If the FortiGate UTM profile has set an action to allow, then the Action column will display that line with a green Accept icon, even if the In the scenario where the |
Filter search operators and syntax
|
Operators or symbols |
Syntax |
|---|---|
|
And |
Find log entries containing all the search terms. Connect the terms with a space character, or “and”. Examples:
|
|
Or |
Find log entries containing any of the search terms. Separate the terms with “or” or a comma “,”. Examples:
|
|
Not |
Find log entries that do NOT contain the search terms. Add “-” before the field name. Example:
|
|
>, < |
Find log entries greater than or less than a value, or within a range. This operator only applies to integer fields. Example:
|
|
IP subnet, range, subnet list search |
Find log entries within a certain IP subnet, IP range, subnet list, or subnet group. Examples:
To create a subnet list or subnet group, see Subnets. |
|
Wildcard search |
You can use wildcard searches for all field types. Examples:
|
|
|
Log View also supports the regex (regular expresion) syntax. |
Filtering FortiClient log messages in FortiGate traffic logs
For FortiClient endpoints registered to FortiGate devices, you can filter log messages in FortiGate traffic log files that are triggered by FortiClient.
To filter FortiClient log messages:
-
Go to Log View > Logs > Fortient Logs > FortiGate > Traffic.
-
In the Add Filter box, type
fct_devid=*. A list of FortiGate traffic logs triggered by FortiClient is displayed. -
In the message log list, select a FortiGate traffic log to view the details.
-
Click the FortiClient tab, and double-click a FortiClient traffic log to see details.
The FortiClient tab is available only when the FortiGate traffic logs reference FortiClient traffic logs.
Filtering for event logs generated when FortiManager installs configuration to FortiSASE
When FortiManager is configured to manage FortiSASE, event logs will be generated by FortiOS when configuration is installed to FortiSASE. The log output from FortiOS will include the FortiManager device name as well as the admin username.
To filter for logs generated when FortiManager installs configuration to FortiSASE:
-
Log View > Logs > Fortient Logs > FortiGate
-
From the Event dropdown, select FortiSASE.
The Remote Device Name column displays the FortiManager device name.
The Remote Admin column displays the FortiManager admin username.