Fortinet white logo
Fortinet white logo

Handbook

6.0.0

Monitoring

Monitoring

With network administration, the first step is installing and configuring the FortiGate to be the protector of the internal network. Once the system is running efficiently, the next step is to monitor the system and network traffic. When a threat or vulnerability is discovered, you can make configuration changes as necessary.

This chapter discusses the various methods of monitoring both the FortiGate and the network traffic through a range of different tools available within FortiOS.

This section includes the topics:

Monitoring

Monitoring

With network administration, the first step is installing and configuring the FortiGate to be the protector of the internal network. Once the system is running efficiently, the next step is to monitor the system and network traffic. When a threat or vulnerability is discovered, you can make configuration changes as necessary.

This chapter discusses the various methods of monitoring both the FortiGate and the network traffic through a range of different tools available within FortiOS.

This section includes the topics: