Fortinet white logo
Fortinet white logo

FortiOS Log Message Reference

9242 - LOG_ID_UNKNOWN_CE_BYPASS

9242 - LOG_ID_UNKNOWN_CE_BYPASS

Message ID: 9242

Message Description: LOG_ID_UNKNOWN_CE_BYPASS

Message Meaning: Scan is bypassed due to unknown content-encoding

Type: Virus

Category: unknown

Severity: Notice

Log Field Name

Description

Data Type

Length

action

The status of the session: blocked - Blocked infected file by AV engine passthrough - Allowed by AV engine monitored - Log, but do NOT block infected file analytics - Submitted to Sandbox for analysis

string

18

date

Date

string

10

devid

string

16

dstintf

Destination Interface

string

32

dstintfrole

Destination Interface's assigned role (LAN, WAN, etc.)

string

10

dstip

Destination IP Address

ip

39

dstport

Destination Port

uint16

5

eventtime

Time when detection occured

uint64

20

eventtype

Event type of AV

string

32

group

Group name (authentication)

string

512

level

Log level

string

11

logid

Log ID

string

10

msg

Log message

string

4096

policyid

Policy ID

uint32

10

poluuid

string

37

profile

The name of the profile that was used to detect and take action

string

64

proto

Protocol number

uint8

3

service

Proxy service which scanned this traffic

string

5

sessionid

Session ID

uint32

10

srcintf

Source Interface

string

32

srcintfrole

Source Interface's assigned role (LAN, WAN, etc.)

string

10

srcip

Source IP Address

ip

39

srcport

Source Port

uint16

5

subtype

Subtype of the virus log

string

20

time

Time

string

8

type

Log type

string

16

tz

Time Zone

string

5

url

The URL address

string

512

user

Username (authentication)

string

256

vd

VDOM name

string

32

vrf

uint8

3

contentencoding

string

512

9242 - LOG_ID_UNKNOWN_CE_BYPASS

9242 - LOG_ID_UNKNOWN_CE_BYPASS

Message ID: 9242

Message Description: LOG_ID_UNKNOWN_CE_BYPASS

Message Meaning: Scan is bypassed due to unknown content-encoding

Type: Virus

Category: unknown

Severity: Notice

Log Field Name

Description

Data Type

Length

action

The status of the session: blocked - Blocked infected file by AV engine passthrough - Allowed by AV engine monitored - Log, but do NOT block infected file analytics - Submitted to Sandbox for analysis

string

18

date

Date

string

10

devid

string

16

dstintf

Destination Interface

string

32

dstintfrole

Destination Interface's assigned role (LAN, WAN, etc.)

string

10

dstip

Destination IP Address

ip

39

dstport

Destination Port

uint16

5

eventtime

Time when detection occured

uint64

20

eventtype

Event type of AV

string

32

group

Group name (authentication)

string

512

level

Log level

string

11

logid

Log ID

string

10

msg

Log message

string

4096

policyid

Policy ID

uint32

10

poluuid

string

37

profile

The name of the profile that was used to detect and take action

string

64

proto

Protocol number

uint8

3

service

Proxy service which scanned this traffic

string

5

sessionid

Session ID

uint32

10

srcintf

Source Interface

string

32

srcintfrole

Source Interface's assigned role (LAN, WAN, etc.)

string

10

srcip

Source IP Address

ip

39

srcport

Source Port

uint16

5

subtype

Subtype of the virus log

string

20

time

Time

string

8

type

Log type

string

16

tz

Time Zone

string

5

url

The URL address

string

512

user

Username (authentication)

string

256

vd

VDOM name

string

32

vrf

uint8

3

contentencoding

string

512