Fortinet white logo
Fortinet white logo

FortiDLP Console User Guide

Detection reports

Detection reports

The Detection reports module lets you view high- and low-level detection data. It provides transparency of the detections that have been generated across the entire organization as well as those related to individual policy groups within the time frame of your choosing. Reports are also provided for entities of interest, which have been assigned flagged labels for increased visibility across the user interface.

Detections are plotted by time in bar graphs, which allow you to drill down through various levels of the data at the click of a button. You can hover over a bar to view time and severity filters that can be applied. Or, you can hover over any detection property to view related filters for refining the data in view. After filtering the data as desired, you can save it as a custom report. And to ease information sharing, you can export reports to CSV or XLSX.

You can use this functionality to measure threat risk, implement new security strategies, and ensure success. For example, a commonly breached policy could highlight cyber hygiene training gaps. After strengthening this part of your corporate security training program and further educating users, you could track their progress by verifying that policy violations decrease.

Detection reports

Detection reports

The Detection reports module lets you view high- and low-level detection data. It provides transparency of the detections that have been generated across the entire organization as well as those related to individual policy groups within the time frame of your choosing. Reports are also provided for entities of interest, which have been assigned flagged labels for increased visibility across the user interface.

Detections are plotted by time in bar graphs, which allow you to drill down through various levels of the data at the click of a button. You can hover over a bar to view time and severity filters that can be applied. Or, you can hover over any detection property to view related filters for refining the data in view. After filtering the data as desired, you can save it as a custom report. And to ease information sharing, you can export reports to CSV or XLSX.

You can use this functionality to measure threat risk, implement new security strategies, and ensure success. For example, a commonly breached policy could highlight cyber hygiene training gaps. After strengthening this part of your corporate security training program and further educating users, you could track their progress by verifying that policy violations decrease.