Fortinet white logo
Fortinet white logo

Online Help

Risk Assessment Policy

Risk Assessment Policy

FortiCWP features risk assessment to check to see if your organization's cloud platform follows the recommended best practices. When users fail to follow these best practices, FortiCWP will send you an alert. To access Risk Assessment policies, go to Policy > Risk Assessment.

Customized Policy

FortiCWP allows you to create personalized policies to suit your organizational needs. To add a custom policy, go to Policy > Risk Assessment, and go to Customized tab. Custom policies focus on two aspects, content monitoring and activity monitoring. Content monitoring is primarily used to monitor files for sensitive data. Activity monitoring is primarily used to monitor users and user activities.

To add a customized Risk Assessment Policy, first create a code pattern.

Code Pattern

  1. Click on New Code in Customized tab under Code Pattern.
  2. Enter a Code Name.
  3. Copy and Paste the code pattern into the terminal.
  4. Press Test to test the code.
  5. If the code is able to run, then click Save.

Customized Risk Assessment Policy

  1. Click on New Policy in Customized tab under Customized Risk Assessment Policy.
  2. Enter Name and Description for the new policy.
  3. Click Severity Level drop down menu to select severity level.
  4. Click Code Pattern drop down menu and select the Code Pattern created earlier.
  5. Click Notification tab to edit notification preference.
  6. Click Add Policy.

Risk Assessment Policy

Risk Assessment Policy

FortiCWP features risk assessment to check to see if your organization's cloud platform follows the recommended best practices. When users fail to follow these best practices, FortiCWP will send you an alert. To access Risk Assessment policies, go to Policy > Risk Assessment.

Customized Policy

FortiCWP allows you to create personalized policies to suit your organizational needs. To add a custom policy, go to Policy > Risk Assessment, and go to Customized tab. Custom policies focus on two aspects, content monitoring and activity monitoring. Content monitoring is primarily used to monitor files for sensitive data. Activity monitoring is primarily used to monitor users and user activities.

To add a customized Risk Assessment Policy, first create a code pattern.

Code Pattern

  1. Click on New Code in Customized tab under Code Pattern.
  2. Enter a Code Name.
  3. Copy and Paste the code pattern into the terminal.
  4. Press Test to test the code.
  5. If the code is able to run, then click Save.

Customized Risk Assessment Policy

  1. Click on New Policy in Customized tab under Customized Risk Assessment Policy.
  2. Enter Name and Description for the new policy.
  3. Click Severity Level drop down menu to select severity level.
  4. Click Code Pattern drop down menu and select the Code Pattern created earlier.
  5. Click Notification tab to edit notification preference.
  6. Click Add Policy.