Fortinet black logo

20000035

Copy Link
Copy Doc ID 0d7bbf47-ee6d-11e9-8977-00505692583a:190752
Download PDF

20000035

Meaning

FTP File Security violation.

Field name Description

log_id

20000035

See Log ID numbers.

main_type

FTP File Security

subtype

  • FTP Antivirus Detection
  • FTP FortiSandbox Detection

Examples

v009xxxxdate=2019-09-27 time=16:17:03 log_id=20000035 msg_id=000007146026 device_id=FV-1KE4417900002 vd="adomain_new" timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" timezone_dayst="GMTa-8" type=attack pri=alert main_type="FTP File Security" sub_type="FTP Antivirus Detection" trigger_policy="" severity_level=Medium proto=tcp service=ftp backend_service=ftp action=Alert policy="FWB_FTP_Policy" src=10.200.10.200 src_port=56714 dst=10.200.10.114 dst_port=49655 http_method=STOR http_url="none" http_host="none" http_agent="none" http_session_id=none msg="filename [level3.zip] virus name [Jerusalem.2080]: FTP file security virus violation" signature_subclass="N/A" signature_id="N/A" signature_cve_id="N/A" srccountry="Reserved" content_switch_name="none" server_pool_name="FTP_ServerPool" false_positive_mitigation="none" user_name="vimay2" monitor_status="Disabled" http_refer="none" http_version="Unknown" dev_id="none" es=0 threat_weight=10 history_threat_weight=0 threat_level=Medium ftp_mode="Passive" ftp_cmd="STOR /level3.zip" cipher_suite="none" ml_log_hmm_probability=0.000000 ml_log_sample_prob_mean=0.000000 ml_log_sample_arglen_mean=0.000000 ml_log_arglen=0 ml_svm_log_main_types=0 ml_svm_log_match_types="none" ml_svm_accuracy="none" ml_domain_index=0 ml_url_dbid=0 ml_arg_dbid=0 ml_allow_method="none" owasp_top10="N/A" bot_info="none"

20000035

Meaning

FTP File Security violation.

Field name Description

log_id

20000035

See Log ID numbers.

main_type

FTP File Security

subtype

  • FTP Antivirus Detection
  • FTP FortiSandbox Detection

Examples

v009xxxxdate=2019-09-27 time=16:17:03 log_id=20000035 msg_id=000007146026 device_id=FV-1KE4417900002 vd="adomain_new" timezone="(GMT+8:00)Beijing,ChongQing,HongKong,Urumgi" timezone_dayst="GMTa-8" type=attack pri=alert main_type="FTP File Security" sub_type="FTP Antivirus Detection" trigger_policy="" severity_level=Medium proto=tcp service=ftp backend_service=ftp action=Alert policy="FWB_FTP_Policy" src=10.200.10.200 src_port=56714 dst=10.200.10.114 dst_port=49655 http_method=STOR http_url="none" http_host="none" http_agent="none" http_session_id=none msg="filename [level3.zip] virus name [Jerusalem.2080]: FTP file security virus violation" signature_subclass="N/A" signature_id="N/A" signature_cve_id="N/A" srccountry="Reserved" content_switch_name="none" server_pool_name="FTP_ServerPool" false_positive_mitigation="none" user_name="vimay2" monitor_status="Disabled" http_refer="none" http_version="Unknown" dev_id="none" es=0 threat_weight=10 history_threat_weight=0 threat_level=Medium ftp_mode="Passive" ftp_cmd="STOR /level3.zip" cipher_suite="none" ml_log_hmm_probability=0.000000 ml_log_sample_prob_mean=0.000000 ml_log_sample_arglen_mean=0.000000 ml_log_arglen=0 ml_svm_log_main_types=0 ml_svm_log_match_types="none" ml_svm_accuracy="none" ml_domain_index=0 ml_url_dbid=0 ml_arg_dbid=0 ml_allow_method="none" owasp_top10="N/A" bot_info="none"