Fortinet white logo
Fortinet white logo

Administration Guide

Creating administrator profiles

Creating administrator profiles

To create a new administrator profile, you must be logged in to an account with sufficient privileges, or as a super user administrator.

To create a custom administrator profile:
  1. Go to System Settings > Admin > Profile.
  2. Click Create New in the toolbar. The New Profile pane is displayed.

  3. Configure the following settings, and then click OK to create the new administrator profile.

    Profile Name

    Enter a name for this profile.

    Description

    Optionally, enter a description for this profile. While not a requirement, a description can help to know what the profiles is for, or the levels it is set to.

    Permissions

    Select None, Read Only, or Read-Write access for the categories as required.

    Privacy Masking

    Enable/disable privacy masking.

    Masked Data Fields

    Select the fields to mask: Destination Name, Source IP, Destination IP, User, Source Name, Email, Message, and/or Source MAC.

    Data Mask Key

    Enter the data masking encryption key. You need the Data Mask Key to see the original data.

Creating administrator profiles

Creating administrator profiles

To create a new administrator profile, you must be logged in to an account with sufficient privileges, or as a super user administrator.

To create a custom administrator profile:
  1. Go to System Settings > Admin > Profile.
  2. Click Create New in the toolbar. The New Profile pane is displayed.

  3. Configure the following settings, and then click OK to create the new administrator profile.

    Profile Name

    Enter a name for this profile.

    Description

    Optionally, enter a description for this profile. While not a requirement, a description can help to know what the profiles is for, or the levels it is set to.

    Permissions

    Select None, Read Only, or Read-Write access for the categories as required.

    Privacy Masking

    Enable/disable privacy masking.

    Masked Data Fields

    Select the fields to mask: Destination Name, Source IP, Destination IP, User, Source Name, Email, Message, and/or Source MAC.

    Data Mask Key

    Enter the data masking encryption key. You need the Data Mask Key to see the original data.