Log settings
Log-related information is inside the <log_settings> </log_settings> XML tags.
<forticlient_configuration>
<system>
<log_settings>
<onnet_local_logging>[0|1]</onnet_local_logging>
<level>6</level>
<log_events>ipsecvpn,sslvpn,scheduler,update,firewall,av,proxy,shield,webfilter,endpoint,fssoma,configd,vuln,sandboxing,antiexploit</log_events>
<remote_logging>
<log_upload_enabled>0</log_upload_enabled>
<log_upload_server>0.0.0.0</log_upload_server>
<log_upload_ssl_enabled>1</log_upload_ssl_enabled>
<log_retention_days>90</log_retention_days>
<log_upload_freq_minutes>90</log_upload_freq_minutes>
<log_generation_timeout_secs>900</log_generation_timeout_secs>
<log_compressed>0</log_compressed>
<log_protocol>syslog</log_protocol>
<!-- faz | syslog -->
<!-- server IP address -->
<netlog_server>0.0.0.0</netlog_server>
<netlog_categories>7</netlog_categories>
</remote_logging>
</log_settings>
</system>
</forticlient_configuration>
The following table provides the XML tags for log settings, as well as the descriptions and default values where applicable.
|
<onnet_local_logging>
|
If client-log-when-on-net is enabled on EMS, EMS sends this XML element.
Boolean value: [0 | 1]
|
|
|
<level>
|
Select the FortiClient logging level. Enter one of the following:
-
0: emergency
-
1: alert
-
2: critical
-
3: error
-
4: warning
-
5: notice
-
6: information
-
7: debug
|
6
|
|
<log_events>
|
FortiClient events or processes to log. One or more comma-separated list of:
-
ipsecvpn: IPsec VPN log events
-
sslvpn: SSL VPN log events
-
firewall: Application Firewall log events
-
av: Antivirus log events
-
webfilter: Web Filtering log events
-
vuln: Vulnerability Scan log events
-
fssoma: Single Sign-On (SSO) mobility agent for FortiAuthenticator log events
-
scheduler: Scheduler log events
-
update: Update log events
-
proxy: FortiProxy log events
-
shield: FortiShield log events
-
endpoint: Endpoint Control log events
-
configd: Configuration log events
-
sandboxing: Sandbox Detection events
|
ipsecvpn, sslvpn, scheduler, update, firewall, av, clientmanager, proxy, shield, webfilter, endpoint, fssoma, configd, vuln
(enable all events by default)
|
|
<remote_logging> elements
All elements for <remote_logging> apply only to remote logs. The elements do not affect the behavior of local logs.
|
|
<log_upload_enabled>
|
Set the Boolean value to 1 to upload logs to the FortiAnalyzer or FortiManager.
Boolean value: [0 | 1]
|
0
|
|
<log_upload_server>
|
Enter the IP address of the FortiAnalyzer or FortiManager to send logs to.
|
|
|
<log_upload_ssl_enabled>
|
Enable or disable use of SSL protocol during log upload.
Boolean value: [0 | 1]
|
1
|
|
<log_upload_freq_minutes>
|
The log frequency upload period in minutes.
|
90
|
|
<log_generation_timeout_sec>
|
How often logs are created in seconds.
|
900
|
|
<log_compressed>
|
Enable or disable compression of logs.
Boolean value: [0 | 1]
|
|
|
<log_retention_days>
|
If the server is not reachable, the number of days to retain the logs in the upload queue before being deleted. Local logs are not deleted.
|
90
|
|
<log_protocol>
|
Enter the remote server type:
-
faz: FortiAnalyzer
-
syslog: Syslog server
|
|
|
<netlog_server>
|
Enter the syslog server's IP address. Used only when <log_protocol> is set to syslog.
|
|
|
<netlog_categories>
|
Enter the bitmask of logs to upload.
Bitmask:
1 = traffic logs
2 = vulnerability logs
4 = event logs
Since these are bitmasks, you may combine as follows:
3 = 1 or 2 (traffic and vulnerability)
5 = 1 or 4 (traffic and event)
6 = 2 or 4 (vulnerability and event)
7 = 1 or 2 or 4 (all logs)
|
7
|
|
The FortiShield daemon protects FortiClient’s own file system and registry settings from modification by unauthorized persons.
|