Report types
Each report type has FortiSASE configuration dependencies that you must have configured in your FortiSASE instance to obtain valid data for the report. You can view the configuration dependencies in Analytics > Scheduled Reports by following one of these steps:
|
For those reports with Application Control as a configuration dependency, you must also configure Intrusion Prevention. See Application Control With Inline-CASB. |
The following lists the report types that you can generate in FortiSASE:
Title |
Description |
---|---|
Application |
|
Application Risk and Control |
Risks that applications introduce on endpoints and efforts to control those risks. The report organizes applications into categories and includes information such as high-risk application, high-risk application by bandwidth, web categories, vulnerability exploits, virus, botnet, adware malicious attacks, zero day, and file transfers. |
Bandwidth and Applications Report |
Traffic, bandwidth, and sessions that users and applications use on endpoints. Also includes a summary of destinations that the user and applications accessed. |
Cyber-Bullying Indicators Report |
Users exhibiting behavior that aligns with common cyberbullying indicators, such as use of offensive phrases on social media. |
High Bandwidth Application Usage Report |
Applications with high bandwidth usage that may affect network performance. This report focuses on the following application types:
|
Self-Harm and Risk Indicators Report |
Users exhibiting behavior that aligns with common self-harm and risk indicators, such as use of risky terms on social media. |
Shadow IT Report |
Summarizes the usage of SaaS apps compared to all applications, sanctioned vs unsanctioned SaaS applications, and total bandwidth by SaaS Sanctioned and Unsanctioned apps. Currently, this report does not support the Top 10 inline CASB applications by occurrences section. |
Security |
|
Cyber Threat Assessment |
Risk of applications on endpoints to cyber threats. Includes a review of application visibility and control, threat detection, threat prevention, and recommended actions. |
Security Events and Incidents Summary |
Security-related events or incidents that FortiSASE collected. |
Threat Report |
Malware and botnet attempts on endpoints. Includes detected malware and botnets. Also includes blocked intrusions, sources, and a timeline of the attempted intrusions as well as the blocked intrusion's severity rating. |
VPN Report |
VPN traffic on endpoints, including authenticated and failed user logins as well as top VPN users. Identifies SSL VPN tunnels and users as well as web mode by bandwidth and duration. |
Web Usage Summary Report |
Web usage on endpoints and a bandwidth summary. Includes top active users and bandwidth usage. Also identifies users who are blocked the most from websites. |