Fortinet black logo

Configuring security settings

Copy Link
Copy Doc ID 1947280d-c519-11ee-8c42-fa163e15d75b:656405
Download PDF

Configuring security settings

You can configure FortiSASE security components settings and view logs for each component in Security. FortiSASE applies enabled security components to each Allow policy in Policies. You can configure some exemptions and overrides for some security components.

FortiSASE has the following security features:

  • Antivirus
  • Web Filter
  • DNS Filter
  • Intrusion prevention
  • File filter
  • Data leak prevention
  • Application control
  • SSL Inspection

For details on configuring these FortiSASE security components, see Security.

For any FortiSASE security component:

  • You can enable it by clicking on the toggle on the top-right corner of the security component’s widget.
  • You can click Customize for any enabled security component to configure further settings.
  • You can click View All to view all detected threats and the count for each threat.
  • You can click View Logs to view logs corresponding to detected threats.

Configuring security settings

You can configure FortiSASE security components settings and view logs for each component in Security. FortiSASE applies enabled security components to each Allow policy in Policies. You can configure some exemptions and overrides for some security components.

FortiSASE has the following security features:

  • Antivirus
  • Web Filter
  • DNS Filter
  • Intrusion prevention
  • File filter
  • Data leak prevention
  • Application control
  • SSL Inspection

For details on configuring these FortiSASE security components, see Security.

For any FortiSASE security component:

  • You can enable it by clicking on the toggle on the top-right corner of the security component’s widget.
  • You can click Customize for any enabled security component to configure further settings.
  • You can click View All to view all detected threats and the count for each threat.
  • You can click View Logs to view logs corresponding to detected threats.