Fortinet white logo
Fortinet white logo

FortiOS Log Message Reference

9242 - LOG_ID_UNKNOWN_CE_BYPASS

9242 - LOG_ID_UNKNOWN_CE_BYPASS

Message ID: 9242

Message Description: LOG_ID_UNKNOWN_CE_BYPASS

Message Meaning: Scan is bypassed due to unknown content-encoding

Type: Virus

Category: unknown-ce

Severity: Notice

Log Field Name

Description

Data Type

Length

vrf

uint16

3

vd

VDOM name

string

32

user

Username (authentication)

string

256

url

The URL address

string

512

tz

Time Zone

string

5

type

Log type

string

16

transid

uint32

10

time

Time

string

8

subtype

Subtype of the virus log

string

20

srcport

Source Port

uint16

5

srcip

Source IP Address

ip

39

srcintfrole

Source Interface's assigned role (LAN, WAN, etc.)

string

10

srcintf

Source Interface

string

32

sessionid

Session ID

uint32

10

service

Proxy service which scanned this traffic

string

5

proto

Protocol number

uint8

3

profile

The name of the profile that was used to detect and take action

string

64

poluuid

string

37

policyid

Policy ID

uint32

10

msg

Log message

string

4096

logid

Log ID

string

10

level

Log level

string

11

group

Group name (authentication)

string

512

eventtype

Event type of AV

string

32

eventtime

Time when detection occured

uint64

20

dstport

Destination Port

uint16

5

dstip

Destination IP Address

ip

39

dstintfrole

Destination Interface's assigned role (LAN, WAN, etc.)

string

10

dstintf

Destination Interface

string

32

devid

string

16

date

Date

string

10

contentencoding

string

512

action

The status of the session: blocked - Blocked infected file by AV engine passthrough - Allowed by AV engine monitored - Log, but do NOT block infected file analytics - Submitted to Sandbox for analysis

string

18

9242 - LOG_ID_UNKNOWN_CE_BYPASS

9242 - LOG_ID_UNKNOWN_CE_BYPASS

Message ID: 9242

Message Description: LOG_ID_UNKNOWN_CE_BYPASS

Message Meaning: Scan is bypassed due to unknown content-encoding

Type: Virus

Category: unknown-ce

Severity: Notice

Log Field Name

Description

Data Type

Length

vrf

uint16

3

vd

VDOM name

string

32

user

Username (authentication)

string

256

url

The URL address

string

512

tz

Time Zone

string

5

type

Log type

string

16

transid

uint32

10

time

Time

string

8

subtype

Subtype of the virus log

string

20

srcport

Source Port

uint16

5

srcip

Source IP Address

ip

39

srcintfrole

Source Interface's assigned role (LAN, WAN, etc.)

string

10

srcintf

Source Interface

string

32

sessionid

Session ID

uint32

10

service

Proxy service which scanned this traffic

string

5

proto

Protocol number

uint8

3

profile

The name of the profile that was used to detect and take action

string

64

poluuid

string

37

policyid

Policy ID

uint32

10

msg

Log message

string

4096

logid

Log ID

string

10

level

Log level

string

11

group

Group name (authentication)

string

512

eventtype

Event type of AV

string

32

eventtime

Time when detection occured

uint64

20

dstport

Destination Port

uint16

5

dstip

Destination IP Address

ip

39

dstintfrole

Destination Interface's assigned role (LAN, WAN, etc.)

string

10

dstintf

Destination Interface

string

32

devid

string

16

date

Date

string

10

contentencoding

string

512

action

The status of the session: blocked - Blocked infected file by AV engine passthrough - Allowed by AV engine monitored - Log, but do NOT block infected file analytics - Submitted to Sandbox for analysis

string

18