Fortinet Document Library

Version:


Table of Contents

User Guide

21.4.0
Copy Link

Getting started

Welcome to the FortiMonitor documentation site. You can find some of the most helpful pages for getting started below. If you cannot find a solution, feel free to contact your account manager or our support team.

Monitoring Approach 

FortiMonitor allows you to monitor your public and private infrastructure using 3 different dimensions of monitoring. Using all 3 dimensions together allows you to correlate different types of events/incidents across your infrastructure. 

  1. Monitor publicly accessible servers and services using our globally distributed monitoring probe network. Test for uptime, performance, and synthetic transactions from any of our 50+ PoPs.

  2. Use the FortiMonitor OnSight vCollector to achieve the same in-depth monitoring and secure reach servers and devices from behind your firewall.

  3. Install our Server Agent to collect key operating system health and application performance metrics and be alerted when different thresholds are breached.

Getting started

Welcome to the FortiMonitor documentation site. You can find some of the most helpful pages for getting started below. If you cannot find a solution, feel free to contact your account manager or our support team.

Monitoring Approach 

FortiMonitor allows you to monitor your public and private infrastructure using 3 different dimensions of monitoring. Using all 3 dimensions together allows you to correlate different types of events/incidents across your infrastructure. 

  1. Monitor publicly accessible servers and services using our globally distributed monitoring probe network. Test for uptime, performance, and synthetic transactions from any of our 50+ PoPs.

  2. Use the FortiMonitor OnSight vCollector to achieve the same in-depth monitoring and secure reach servers and devices from behind your firewall.

  3. Install our Server Agent to collect key operating system health and application performance metrics and be alerted when different thresholds are breached.