beautypg.com

Vulnerability reports, Creating and generating a report – Fortinet FortiLog-400 User Manual

Page 67

background image

Reports

Vulnerability reports

FortiLog Administration Guide

05-16000-0082-20050115

67

Figure 36: VPN activity report in PDF

Vulnerability reports

Vulnerability reports show any potential weaknesses to attacks that may exist for
selected devices by displaying the available ports on a FortiGate device. Rather than
using the device logs for this report, the FortiLog unit queries for open ports and
where possible and gathers information about the services running. Any known
vulnerabilities that exist for the specific service or version of the service, are included
in the reports.

Creating and generating a report

To generate a vulnerability report, begin by creating and saving a report configuration.
You can use this report configuration for a scheduled report or for generating reports
on demand.

To create a report

1

Go to Reports > Config > Vulnerability.

2

Select New and enter a name for the report.

This manual is related to the following products: