Exporting threat hunting logs
For on-premise deployments, when you submit a support ticket about issues with Threat Hunting Repository installation, upgrade, or general functioning, you must include the threat hunting logs.
To collect threat hunting logs:
-
Run the following command:
sudo bash /opt/FortiEDR/deployments/latest/deployment/ci-tools/get_logs.sh
The script will create logs archive in the
/tmp/
directory. -
Use the SCP client to download the
.tgz
file.You can then attach the file to the support ticket.
To retrieve Collector, Core, and Aggegator logs, see the following: |