Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Administration Guide

Threats by Devices - level 1

The following options are available:

Time Period

Select the time period from the dropdown list. Select one of the following: 24 Hours, 7 Days, or 4 Weeks.

Export Data

Click the Export Data button to create a PDF or CSV snapshot report. The time period of included jobs in the report depends on the selection made in the Time Period dropdown. The time to generate the report is dependent on the number of events selected. You can wait until the report is ready to view, or navigate away and find the report later in Log & Report > Report Center page.

Search

Show or hide the search filter field.

Refresh

Click the Refresh icon to refresh the entries displayed after applying search filters.

Add Search Filter

Click the Search Filter field to add search filters. Click the Cancel icon to the left of the search filter to remove the specific filter. Click the S icon in the search filter field to clear all filters.

Search filters can be used to filter the information displayed in the GUI. You can input a partial value to search all records that contain it.

View Jobs

Click the View Jobs icon to drill down the entry.

Pagination

Use the pagination options to browse entries displayed.

This page displays the following information:

Device

Displays the device name. Click the column header to sort the table by this column.

Note: A different VDOM or protected email domain on the same device is considered a different device.

# of Malicious Files

The number of malicious files submitted by the device. Click the column header to sort the table by this column.

# of Suspicious Files

The number of suspicious files submitted by the device. Click the column header to sort the table by this column.

Timeline

View the Threat Timeline Chart of the device. When you hover on any dot, all victim hosts managed by the device will appear in five minutes. When you click on any dot in the chart, all events associated will be displayed. When you click on an event, the View Details page will open.

Total Devices

The number of devices displayed and the total number of devices.

Threats by Devices - level 1

The following options are available:

Time Period

Select the time period from the dropdown list. Select one of the following: 24 Hours, 7 Days, or 4 Weeks.

Export Data

Click the Export Data button to create a PDF or CSV snapshot report. The time period of included jobs in the report depends on the selection made in the Time Period dropdown. The time to generate the report is dependent on the number of events selected. You can wait until the report is ready to view, or navigate away and find the report later in Log & Report > Report Center page.

Search

Show or hide the search filter field.

Refresh

Click the Refresh icon to refresh the entries displayed after applying search filters.

Add Search Filter

Click the Search Filter field to add search filters. Click the Cancel icon to the left of the search filter to remove the specific filter. Click the S icon in the search filter field to clear all filters.

Search filters can be used to filter the information displayed in the GUI. You can input a partial value to search all records that contain it.

View Jobs

Click the View Jobs icon to drill down the entry.

Pagination

Use the pagination options to browse entries displayed.

This page displays the following information:

Device

Displays the device name. Click the column header to sort the table by this column.

Note: A different VDOM or protected email domain on the same device is considered a different device.

# of Malicious Files

The number of malicious files submitted by the device. Click the column header to sort the table by this column.

# of Suspicious Files

The number of suspicious files submitted by the device. Click the column header to sort the table by this column.

Timeline

View the Threat Timeline Chart of the device. When you hover on any dot, all victim hosts managed by the device will appear in five minutes. When you click on any dot in the chart, all events associated will be displayed. When you click on an event, the View Details page will open.

Total Devices

The number of devices displayed and the total number of devices.