Fortinet white logo
Fortinet white logo

Administration Guide

Analysis

Analysis

Incident > Analysis lists the Incidents detected by FortiDeceptor.

To use the Analysis page:
  1. Go to Incident > Analysis.
  2. The Analysis page displays the list of events:

    Severity

    Severity of the event.

    Last Activity

    Date and time of the last activity.

    Type

    Type of event.

    Attacker IP

    Attacker IP mask.

    Attacker User

    Attacker username.

    Victim IP

    IP address of the victim.

    Victim Port

    Port of the victim.

    Lure

    Name of the lure service.

    Decoy ID

    Unique ID of the Decoy VM.

    ID

    ID of the incident.

    Attacker Port

    Port where the attack originated.

    Tag Key

    Unique key string for the incident.

    Attacker Password

    Password used by the attacker.

    Start

    Date and time when the attack started.

  3. To refresh the data, click Refresh.
  4. To download the detailed analysis report in PDF format, click Export to PDF.
  5. To mark items as read, expand the incident details or click Mark all as read.

    Newly-detected incidents are in bold to indicate they are unread.

  6. To display specific types of events, click Show Interaction Events Only (default), IPS Events Only, Web Filter Events Only, or All.
  7. To specify columns and table settings, use the Settings icon at the bottom right.

Analysis

Analysis

Incident > Analysis lists the Incidents detected by FortiDeceptor.

To use the Analysis page:
  1. Go to Incident > Analysis.
  2. The Analysis page displays the list of events:

    Severity

    Severity of the event.

    Last Activity

    Date and time of the last activity.

    Type

    Type of event.

    Attacker IP

    Attacker IP mask.

    Attacker User

    Attacker username.

    Victim IP

    IP address of the victim.

    Victim Port

    Port of the victim.

    Lure

    Name of the lure service.

    Decoy ID

    Unique ID of the Decoy VM.

    ID

    ID of the incident.

    Attacker Port

    Port where the attack originated.

    Tag Key

    Unique key string for the incident.

    Attacker Password

    Password used by the attacker.

    Start

    Date and time when the attack started.

  3. To refresh the data, click Refresh.
  4. To download the detailed analysis report in PDF format, click Export to PDF.
  5. To mark items as read, expand the incident details or click Mark all as read.

    Newly-detected incidents are in bold to indicate they are unread.

  6. To display specific types of events, click Show Interaction Events Only (default), IPS Events Only, Web Filter Events Only, or All.
  7. To specify columns and table settings, use the Settings icon at the bottom right.