Fortinet Document Library

Version:

Version:


Table of Contents

Administration Guide

Download PDF
Copy Link

Security actions

The Security Actions view allows you to add, modify, and delete actions that can be associated to an alarm. If the action is selected, it can be executed automatically or manually, depending on the security rule configuration.

Settings

Field

Definition

Add Filter

Allows you to select a field from the current view to filter information. Select the field from the drop-down list, and then enter the information you wish to filter. See Filters.

Update

Displays the filtered data in the table.

Table columns

Name

User defined name for the action. The type of action that will occur if the rule is enabled.

Activity Failure

Indicates whether the system will continue to perform activities for the action if a higher- ranked activity fails. When Continue Running Activities is selected, the next ranked activity in the list is performed after a higher-ranked activity fails. When Stop Running Activities is selected, no lower-ranked activities are executed when a higher-ranked activity fails.

Secondary Task Delay

The amount of time that will pass before the enabled secondary activity is executed for an activity. For example, the user may wish to enable the host 15 minutes after the host was initially disabled.

Activity Summary

A description of the activity that will occur.

Last Modified By

User name of the last user to modify the action.

Last Modified Date

Date and time of the last modification to this action.

Right click options

Delete

Deletes the selected action.

Modify

Opens the Modify Security Action window for the selected action.

Show Audit Log

Opens the admin auditing log showing all changes made to the selected item.

For information about the admin auditing log, see Admin auditing.

Note

You must have permission to view the admin auditing log. See Add an administrator profile.

Buttons

Export

Exports the data displayed to a file in the default downloads location. File types include CSV, Excel, PDF, or RTF. See Export data.

Security actions

The Security Actions view allows you to add, modify, and delete actions that can be associated to an alarm. If the action is selected, it can be executed automatically or manually, depending on the security rule configuration.

Settings

Field

Definition

Add Filter

Allows you to select a field from the current view to filter information. Select the field from the drop-down list, and then enter the information you wish to filter. See Filters.

Update

Displays the filtered data in the table.

Table columns

Name

User defined name for the action. The type of action that will occur if the rule is enabled.

Activity Failure

Indicates whether the system will continue to perform activities for the action if a higher- ranked activity fails. When Continue Running Activities is selected, the next ranked activity in the list is performed after a higher-ranked activity fails. When Stop Running Activities is selected, no lower-ranked activities are executed when a higher-ranked activity fails.

Secondary Task Delay

The amount of time that will pass before the enabled secondary activity is executed for an activity. For example, the user may wish to enable the host 15 minutes after the host was initially disabled.

Activity Summary

A description of the activity that will occur.

Last Modified By

User name of the last user to modify the action.

Last Modified Date

Date and time of the last modification to this action.

Right click options

Delete

Deletes the selected action.

Modify

Opens the Modify Security Action window for the selected action.

Show Audit Log

Opens the admin auditing log showing all changes made to the selected item.

For information about the admin auditing log, see Admin auditing.

Note

You must have permission to view the admin auditing log. See Add an administrator profile.

Buttons

Export

Exports the data displayed to a file in the default downloads location. File types include CSV, Excel, PDF, or RTF. See Export data.