Fortinet white logo
Fortinet white logo

Handbook

Log Access

Log Access

This section includes the following topics:

Using the DDoS attack log table

Using the event log table

Attack Log Backup

Login Events