Fortinet black logo

Administration Guide

Report types

Report types

Note

Each report type has FortiSASE configuration dependencies that you must have configured in your FortiSASE instance to obtain valid data for the report.

You can view the configuration dependencies in Analytics > Scheduled Reports by following one of these steps:

  • Scrolling to the right and viewing them in the Dependencies column
  • Selecting the report, clicking Customize report, and viewing them in the Dependencies section under Report
Note

For those reports with Application Control as a configuration dependency, you must also configure Intrusion Prevention. See Application Control With Inline-CASB.

The following lists the report types that you can generate in FortiSASE:

Title

Description

Application

Application Risk and Control

Risks that applications introduce on endpoints and efforts to control those risks. The report organizes applications into categories and includes information such as high-risk application, high-risk application by bandwidth, web categories, vulnerability exploits, virus, botnet, adware malicious attacks, zero day, and file transfers.

Bandwidth and Applications Report

Traffic, bandwidth, and sessions that users and applications use on endpoints. Also includes a summary of destinations that the user and applications accessed.

Cyber-Bullying Indicators Report

Users exhibiting behavior that aligns with common cyberbullying indicators, such as use of offensive phrases on social media.

High Bandwidth Application Usage Report

Applications with high bandwidth usage that may affect network performance. This report focuses on the following application types:

  • Peer-to-peer, such as BitTorrent, Xunlei, Gnutella, and Filetopia
  • File sharing and storage applications, such as Onebox, Google Drive, Dropbox, and Apple Cloud
  • Voice or video applications, such as YouTube, Skype, Spotify, Vimeo, and Netflix

Self-Harm and Risk Indicators Report

Users exhibiting behavior that aligns with common self-harm and risk indicators, such as use of risky terms on social media.

Shadow IT Report

Summarizes the usage of SaaS apps compared to all applications, sanctioned vs unsanctioned SaaS applications, and total bandwidth by SaaS Sanctioned and Unsanctioned apps.

Currently, this report does not support the Top 10 inline CASB applications by occurrences section.

Security

Cyber Threat Assessment

Risk of applications on endpoints to cyber threats. Includes a review of application visibility and control, threat detection, threat prevention, and recommended actions.

Security Events and Incidents Summary

Security-related events or incidents that FortiSASE collected.

Threat Report

Malware and botnet attempts on endpoints. Includes detected malware and botnets. Also includes blocked intrusions, sources, and a timeline of the attempted intrusions as well as the blocked intrusion's severity rating.

VPN Report

VPN traffic on endpoints, including authenticated and failed user logins as well as top VPN users. Identifies SSL VPN tunnels and users as well as web mode by bandwidth and duration.

Web Usage Summary Report

Web usage on endpoints and a bandwidth summary. Includes top active users and bandwidth usage. Also identifies users who are blocked the most from websites.

Related Videos

sidebar video

FortiSASE - Consolidated Reports

  • 318 views
  • 1 years ago

Report types

Note

Each report type has FortiSASE configuration dependencies that you must have configured in your FortiSASE instance to obtain valid data for the report.

You can view the configuration dependencies in Analytics > Scheduled Reports by following one of these steps:

  • Scrolling to the right and viewing them in the Dependencies column
  • Selecting the report, clicking Customize report, and viewing them in the Dependencies section under Report
Note

For those reports with Application Control as a configuration dependency, you must also configure Intrusion Prevention. See Application Control With Inline-CASB.

The following lists the report types that you can generate in FortiSASE:

Title

Description

Application

Application Risk and Control

Risks that applications introduce on endpoints and efforts to control those risks. The report organizes applications into categories and includes information such as high-risk application, high-risk application by bandwidth, web categories, vulnerability exploits, virus, botnet, adware malicious attacks, zero day, and file transfers.

Bandwidth and Applications Report

Traffic, bandwidth, and sessions that users and applications use on endpoints. Also includes a summary of destinations that the user and applications accessed.

Cyber-Bullying Indicators Report

Users exhibiting behavior that aligns with common cyberbullying indicators, such as use of offensive phrases on social media.

High Bandwidth Application Usage Report

Applications with high bandwidth usage that may affect network performance. This report focuses on the following application types:

  • Peer-to-peer, such as BitTorrent, Xunlei, Gnutella, and Filetopia
  • File sharing and storage applications, such as Onebox, Google Drive, Dropbox, and Apple Cloud
  • Voice or video applications, such as YouTube, Skype, Spotify, Vimeo, and Netflix

Self-Harm and Risk Indicators Report

Users exhibiting behavior that aligns with common self-harm and risk indicators, such as use of risky terms on social media.

Shadow IT Report

Summarizes the usage of SaaS apps compared to all applications, sanctioned vs unsanctioned SaaS applications, and total bandwidth by SaaS Sanctioned and Unsanctioned apps.

Currently, this report does not support the Top 10 inline CASB applications by occurrences section.

Security

Cyber Threat Assessment

Risk of applications on endpoints to cyber threats. Includes a review of application visibility and control, threat detection, threat prevention, and recommended actions.

Security Events and Incidents Summary

Security-related events or incidents that FortiSASE collected.

Threat Report

Malware and botnet attempts on endpoints. Includes detected malware and botnets. Also includes blocked intrusions, sources, and a timeline of the attempted intrusions as well as the blocked intrusion's severity rating.

VPN Report

VPN traffic on endpoints, including authenticated and failed user logins as well as top VPN users. Identifies SSL VPN tunnels and users as well as web mode by bandwidth and duration.

Web Usage Summary Report

Web usage on endpoints and a bandwidth summary. Includes top active users and bandwidth usage. Also identifies users who are blocked the most from websites.