Fortinet white logo
Fortinet white logo

Administration Guide

Threats by Files - level 2

Threats by Files - level 2

Back

Click the Back icon to return to the main landing page.

Time Period

Select the time period from the dropdown list. Select one of the following: 24 Hours, 7 Days, or 4 Weeks.

Search

Show or hide the search filter field.

Refresh

Click the refresh icon to refresh the entries displayed after applying search filters.

Add Search Filter

Click the search filter field to add search filters. Click the cancel icon to the left of the search filter to remove the specific filter.

Search filters can be used to filter the information displayed in the GUI.

View Jobs

Click the View Jobs icon to drill down the entry.

Pagination

Use the pagination options to browse entries displayed.

The following information is displayed:

Back

Click the Back button to return to the main landing page.

Summary of

Summary information including the file name, source IP address, destination IP address, time period, download location, file type, threat type, submission information, and device information (if available). If the malware appears more than once, the information is from its most recent detection.

Details

Detail information including user IP address. destination IP address, and number of detection times. Select the View Jobs icon, or double-click on the row, to drill down the entry.

Threats by Files - level 2

Threats by Files - level 2

Back

Click the Back icon to return to the main landing page.

Time Period

Select the time period from the dropdown list. Select one of the following: 24 Hours, 7 Days, or 4 Weeks.

Search

Show or hide the search filter field.

Refresh

Click the refresh icon to refresh the entries displayed after applying search filters.

Add Search Filter

Click the search filter field to add search filters. Click the cancel icon to the left of the search filter to remove the specific filter.

Search filters can be used to filter the information displayed in the GUI.

View Jobs

Click the View Jobs icon to drill down the entry.

Pagination

Use the pagination options to browse entries displayed.

The following information is displayed:

Back

Click the Back button to return to the main landing page.

Summary of

Summary information including the file name, source IP address, destination IP address, time period, download location, file type, threat type, submission information, and device information (if available). If the malware appears more than once, the information is from its most recent detection.

Details

Detail information including user IP address. destination IP address, and number of detection times. Select the View Jobs icon, or double-click on the row, to drill down the entry.