Fortinet black logo

Online Help

Risk Management Policy

Copy Link
Copy Doc ID cf00dcb1-0886-11ed-bb32-fa163e15d75b:963609

Risk Management Policy

Predefined Risk Management Policy

Configuration risk policies is a set of configuration policies recommended by FortiCNP to check if your organization's cloud platforms follow FortiCNP recommended best practices.

When users fail to follow these best practices, FortiCNP will trigger a finding. Findings can be viewed in INSIGHTS > Risk > Findings tab.

To access predefined Risk Management policies, go to POLICIES > Risk Management > Predefined tab.

For tutorial and examples on configuring Predefined Risk Management policy, please see Predefined Policy Configuration.

Customized Risk Management Policy

Customized Risk Management Policy allows you to create customized policies to suit your organizational needs.

To add a custom policy, go to POLICIES > Risk Management > Customized tab.

Custom Risk Management Policies focus on two aspects, content monitoring and activity monitoring.

Content monitoring is primarily used to monitor files for sensitive data while activity monitoring monitors users and user activities.

For tutorial and examples on creating customized risk assessment policy, please see Create Customized Risk Management Policy

Risk Management Policy

Predefined Risk Management Policy

Configuration risk policies is a set of configuration policies recommended by FortiCNP to check if your organization's cloud platforms follow FortiCNP recommended best practices.

When users fail to follow these best practices, FortiCNP will trigger a finding. Findings can be viewed in INSIGHTS > Risk > Findings tab.

To access predefined Risk Management policies, go to POLICIES > Risk Management > Predefined tab.

For tutorial and examples on configuring Predefined Risk Management policy, please see Predefined Policy Configuration.

Customized Risk Management Policy

Customized Risk Management Policy allows you to create customized policies to suit your organizational needs.

To add a custom policy, go to POLICIES > Risk Management > Customized tab.

Custom Risk Management Policies focus on two aspects, content monitoring and activity monitoring.

Content monitoring is primarily used to monitor files for sensitive data while activity monitoring monitors users and user activities.

For tutorial and examples on creating customized risk assessment policy, please see Create Customized Risk Management Policy