Fortinet black logo

Reports

Copy Link
Copy Doc ID 37385887-1beb-11ec-8c53-00505692583a:978868
Download PDF

Reports

Threat Report

The Threat Report provides automated reports for various behaviors, from which you can export releveant charts and raw data.

Navigate to Reports > Threat Report. From here, you can view the automated reports which show headline activity for a number of key user behaviors, including the following:

  • Applications and users flagged as high risk
  • Hacking tools have been detected
  • Password or login credentials stored in insecure files
  • Cloud storage applications have been used

The following image shows an example of the Threat Report dashboard:

Threat Report recommendations

To show the recommendations, select click to view details. To hide the recommendations, click the headline section again. The information provides security advice about how to protect your network from the identified behaviors.

The following image show an example of recommendations for the use of Cloud storage applications:

Threat Report interactive elements

You can click individual fields in the bars graphs to jump to the Threat Hunting dashboard with the relevant search criteria already populated.

Threat Report export

To jump to the FortiInsight page with the relevant data used in the report, click View Data.

To export elements of a Threat Report as CSV files, so that you can use them in other reporting tools, click Export Raw Data.

To print a formatted version of the Threat Report with title and end pages, click Print.

Reports

Threat Report

The Threat Report provides automated reports for various behaviors, from which you can export releveant charts and raw data.

Navigate to Reports > Threat Report. From here, you can view the automated reports which show headline activity for a number of key user behaviors, including the following:

  • Applications and users flagged as high risk
  • Hacking tools have been detected
  • Password or login credentials stored in insecure files
  • Cloud storage applications have been used

The following image shows an example of the Threat Report dashboard:

Threat Report recommendations

To show the recommendations, select click to view details. To hide the recommendations, click the headline section again. The information provides security advice about how to protect your network from the identified behaviors.

The following image show an example of recommendations for the use of Cloud storage applications:

Threat Report interactive elements

You can click individual fields in the bars graphs to jump to the Threat Hunting dashboard with the relevant search criteria already populated.

Threat Report export

To jump to the FortiInsight page with the relevant data used in the report, click View Data.

To export elements of a Threat Report as CSV files, so that you can use them in other reporting tools, click Export Raw Data.

To print a formatted version of the Threat Report with title and end pages, click Print.