Fortinet white logo
Fortinet white logo

Handbook

Using the security log

Using the security log

The Security Log table displays logs related to security features.

Before you begin:
  • You must have Read-Write permission for Log & Report settings.
To view and filter the log:
  1. Go to Log & Report > Log Browsing.
  2. Click the Security Logs tab to display the attack log.

IP Reputation log to Geo IP log list the log columns in the order in which they appear in the log.

IP Reputation log

Column Example Description
date date=2014-12-02 Log date.
time time=10:27:01 Log time.
log_id log_id=0200004230 Log ID.
type type=attack Log type: attack.
subtype subtype=ip_reputation Log subtype: ip_reputation.
pri pri=warning Log level.
vd vd=root Virtual domain.
msg_id msg_id=13065998 Message ID.
count count=1 For IP reputation, count=1.
severity severity=high Rule severity.
proto proto=6 Protocol.
service service=http Service.
src src=4.4.4.4 Source IP address.
src_port src_port=49301 Source port.
dst dst=2.2.2.2 Destination IP address.
dst_port dst_port=80 Destination port.
policy policy=vs1 Virtual server name.
action action=deny Policy action.
srccountry srccountry=cn Location of the source IP address.
dstcountry dstcountry=us Location of the destination IP address.
msg msg=msg

Security rule name, category, subcategory, and description of the attack.

WAF log

Column Example Description
date date=2015-07-22 Log date.
time time=10:27:01 Log time.
log_id log_id=0202008074 Log ID.
type type=attack Log type: attack.
subtype subtype=waf Log subtype: waf.
pri pri=alert Log level.
vd vd=root Virtual domain.
msg_id msg_id=1512 Message ID.
count count=1 Rule match count.
severity severity=low Rule severity.
proto proto=6 Protocol.
service service=http Service.
src src=1.1.1.1 Source IP address.
src_port src_port=34352 Source port.
dst dst=2.2.2.2 Destination IP address.
dst_port dst_port=80 Destination port.
policy policy=vs1 Virtual server name.
action action=pass Policy action.
sigid sigid=1 Attack signature ID.

owasp_top10

owasp_top10=A3:2017-Sensitive Data Exposure

OWASP Top10 category

subcat subcat=waf_subtype WAF module: waf_web_attack_signature, waf_url_access, waf_http_protocol_cont and waf_sql_xss_injection_detect.

http_method

http_method=GET

HTTP method in HTTP request

http_host http_host=192.168.1.140:8080 HTTP Host header in HTTP request. Maximum length is 64. Longer URIs are truncated and appended with ....
http_url http_url=/bigdata URI in HTTP request. Maximum length is 128. Longer URIs are truncated and appended with ....

user_agent

user_agent=curl/7.19.7 (i386-redhat-linux-gnu)

libcurl/7.19.7 NSS/3.16.2.3 Basic ECC

zlib/1.2.3 libidn/1.18 libssh2/1.4.2

User agent in HTTP request.

pkt_hdr pkt_hdr=header Contents of the packet header that matched the attack signature.
srccountry srccountry=Australia Location of the source IP address.
dstcountry dstcountry=France Location of the destination IP address.
msg msg="Find Attack ID: 1010010001 NAME: "HTTP Method Violation" CATEGORY: "HTTP Protocol Constraint" SUB_CATEGORY: "Request Method Rule"" Security rule name, category, subcategory, and description of the attack.

example

GET /etc/passwd HTTP/1.1

Host: www.example.com

Connection: keep-alive

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36

Accept: text/html,application/xhtml+xml,application/xml

Referer: https://www.example.com/login.html

Accept-Encoding: gzip, deflate, br

Accept-Language: zh-CN,zh;q=0.9

An example of what the WAF scan engine looks for. "/etc/passwd" is the signature in this example. The WAF scan engine inpsects HTTP packets and if the signature matches, it is logged.

Geo IP log

Column Example Description
date date=2014-12-02 Log date.
time time=10:27:01 Log time.
log_id log_id=0200004230 Log ID.
type type=attack Log type: attack.
subtype subtype=geo Log subtype: geo.
pri pri=warning Log level.
vd vd=root Virtual domain.
msg_id msg_id=13065998 Message ID.
count count=1 Rule match count.
severity severity=high Rule severity.
proto proto=0 Protocol.
service service=http Service.
src src=173.177.99.94 Source IP address.
src_port src_port=49301 Source port.
dst dst=10.61.2.100 Destination IP address.
dst_port dst_port=80 Destination port.
policy policy=vs1 Virtual server name.
action action=deny Policy action.
srccountry srccountry=cn Location of the source IP address.
dstcountry dstcountry=us Location of the destination IP address.
msg msg=msg Security rule name, category, subcategory, and description of the attack.

AV log

Column Example Description
date date=2014-12-02 Log date.
time time=10:27:01 Log time.
log_id log_id=0200004230 Log ID.
msg_id message id=362301459 Message ID
virus category virus category=N/A Virus Category.
count count=1 Rule match count.
severity severity=high Rule severity.
proto proto=0 Protocol.
service service=http Service.
src src=173.177.99.94 Source IP address.
src_port src_port=49301 Source port.
dst dst=10.61.2.100 Destination IP address.
dst_port dst_port=80 Destination port.
type type=attack Type
subtype subtype=av Sub Type
action action=deny Policy action.
srccountry srccountry=cn Location of the source IP address.
dstcountry dstcountry=us Location of the destination IP address.
msg msg=msg Security rule name, category, subcategory, and description of the attack.
sign_id sign_id=0 Signature ID
virus_id virus_id=0 Virus ID
av_anatype av_anatype=analytics AV AnaType
url url=none URL
virus/botnet virus/botnet=N/A Virus/Botnet
Submitted to FortiSandbox Submitted_to_Fortisandbox=no Submitted to FortiSandBox
quar file name quar_file_name=N/A Quar File Name
Proto Method proto_method=none Proto Method
AV Profile av_profile=AV1 AV Profile
FortiSandbox Checksum B08663FD9FC147D6ADBB3D70DCEC1271A4288C71D887D44811D93E366D91AD2C

Using the security log

Using the security log

The Security Log table displays logs related to security features.

Before you begin:
  • You must have Read-Write permission for Log & Report settings.
To view and filter the log:
  1. Go to Log & Report > Log Browsing.
  2. Click the Security Logs tab to display the attack log.

IP Reputation log to Geo IP log list the log columns in the order in which they appear in the log.

IP Reputation log

Column Example Description
date date=2014-12-02 Log date.
time time=10:27:01 Log time.
log_id log_id=0200004230 Log ID.
type type=attack Log type: attack.
subtype subtype=ip_reputation Log subtype: ip_reputation.
pri pri=warning Log level.
vd vd=root Virtual domain.
msg_id msg_id=13065998 Message ID.
count count=1 For IP reputation, count=1.
severity severity=high Rule severity.
proto proto=6 Protocol.
service service=http Service.
src src=4.4.4.4 Source IP address.
src_port src_port=49301 Source port.
dst dst=2.2.2.2 Destination IP address.
dst_port dst_port=80 Destination port.
policy policy=vs1 Virtual server name.
action action=deny Policy action.
srccountry srccountry=cn Location of the source IP address.
dstcountry dstcountry=us Location of the destination IP address.
msg msg=msg

Security rule name, category, subcategory, and description of the attack.

WAF log

Column Example Description
date date=2015-07-22 Log date.
time time=10:27:01 Log time.
log_id log_id=0202008074 Log ID.
type type=attack Log type: attack.
subtype subtype=waf Log subtype: waf.
pri pri=alert Log level.
vd vd=root Virtual domain.
msg_id msg_id=1512 Message ID.
count count=1 Rule match count.
severity severity=low Rule severity.
proto proto=6 Protocol.
service service=http Service.
src src=1.1.1.1 Source IP address.
src_port src_port=34352 Source port.
dst dst=2.2.2.2 Destination IP address.
dst_port dst_port=80 Destination port.
policy policy=vs1 Virtual server name.
action action=pass Policy action.
sigid sigid=1 Attack signature ID.

owasp_top10

owasp_top10=A3:2017-Sensitive Data Exposure

OWASP Top10 category

subcat subcat=waf_subtype WAF module: waf_web_attack_signature, waf_url_access, waf_http_protocol_cont and waf_sql_xss_injection_detect.

http_method

http_method=GET

HTTP method in HTTP request

http_host http_host=192.168.1.140:8080 HTTP Host header in HTTP request. Maximum length is 64. Longer URIs are truncated and appended with ....
http_url http_url=/bigdata URI in HTTP request. Maximum length is 128. Longer URIs are truncated and appended with ....

user_agent

user_agent=curl/7.19.7 (i386-redhat-linux-gnu)

libcurl/7.19.7 NSS/3.16.2.3 Basic ECC

zlib/1.2.3 libidn/1.18 libssh2/1.4.2

User agent in HTTP request.

pkt_hdr pkt_hdr=header Contents of the packet header that matched the attack signature.
srccountry srccountry=Australia Location of the source IP address.
dstcountry dstcountry=France Location of the destination IP address.
msg msg="Find Attack ID: 1010010001 NAME: "HTTP Method Violation" CATEGORY: "HTTP Protocol Constraint" SUB_CATEGORY: "Request Method Rule"" Security rule name, category, subcategory, and description of the attack.

example

GET /etc/passwd HTTP/1.1

Host: www.example.com

Connection: keep-alive

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36

Accept: text/html,application/xhtml+xml,application/xml

Referer: https://www.example.com/login.html

Accept-Encoding: gzip, deflate, br

Accept-Language: zh-CN,zh;q=0.9

An example of what the WAF scan engine looks for. "/etc/passwd" is the signature in this example. The WAF scan engine inpsects HTTP packets and if the signature matches, it is logged.

Geo IP log

Column Example Description
date date=2014-12-02 Log date.
time time=10:27:01 Log time.
log_id log_id=0200004230 Log ID.
type type=attack Log type: attack.
subtype subtype=geo Log subtype: geo.
pri pri=warning Log level.
vd vd=root Virtual domain.
msg_id msg_id=13065998 Message ID.
count count=1 Rule match count.
severity severity=high Rule severity.
proto proto=0 Protocol.
service service=http Service.
src src=173.177.99.94 Source IP address.
src_port src_port=49301 Source port.
dst dst=10.61.2.100 Destination IP address.
dst_port dst_port=80 Destination port.
policy policy=vs1 Virtual server name.
action action=deny Policy action.
srccountry srccountry=cn Location of the source IP address.
dstcountry dstcountry=us Location of the destination IP address.
msg msg=msg Security rule name, category, subcategory, and description of the attack.

AV log

Column Example Description
date date=2014-12-02 Log date.
time time=10:27:01 Log time.
log_id log_id=0200004230 Log ID.
msg_id message id=362301459 Message ID
virus category virus category=N/A Virus Category.
count count=1 Rule match count.
severity severity=high Rule severity.
proto proto=0 Protocol.
service service=http Service.
src src=173.177.99.94 Source IP address.
src_port src_port=49301 Source port.
dst dst=10.61.2.100 Destination IP address.
dst_port dst_port=80 Destination port.
type type=attack Type
subtype subtype=av Sub Type
action action=deny Policy action.
srccountry srccountry=cn Location of the source IP address.
dstcountry dstcountry=us Location of the destination IP address.
msg msg=msg Security rule name, category, subcategory, and description of the attack.
sign_id sign_id=0 Signature ID
virus_id virus_id=0 Virus ID
av_anatype av_anatype=analytics AV AnaType
url url=none URL
virus/botnet virus/botnet=N/A Virus/Botnet
Submitted to FortiSandbox Submitted_to_Fortisandbox=no Submitted to FortiSandBox
quar file name quar_file_name=N/A Quar File Name
Proto Method proto_method=none Proto Method
AV Profile av_profile=AV1 AV Profile
FortiSandbox Checksum B08663FD9FC147D6ADBB3D70DCEC1271A4288C71D887D44811D93E366D91AD2C