Provisioning Templates – FortiManager 5.2

WIDS Profile

The WIDS monitors wireless traffic for a wide range of security threats by detecting and reporting on possible intrusion attempts. When an attack is detected, a log message is recorded.

WIDS profiles can be created, edited, cloned, deleted, imported, and searched. A default profile is available by default.

To view the wireless profiles, in the Provisioning Templates tree menu, select an ADOM, then select WiFi Templates > WIDS Profiles. The WIDS profile list is displayed, with the following information is available:

Name The profile’s name.
Comments Comments about the profile.
Last Modified The date and time that the entry was last modified including the administrative user name of the user who made the change.

The following options are available:

Create New Create a new WIDS profile. See To create a new WIDS profile:.
Delete Select to delete the selected WIDS profiles. See To delete a WIDS profile:.
Import Select to import WIDS profiles. See To import a WIDS profile:.
Clone Select an entry from this list, right-click and select Clone from the context menu to clone the entry.
Search Search the WIDS profiles by entering a search term in the search field.
Column Settings Right-click the column header to view and edit column settings. Column settings include the option to restore columns to their default state. Left-click column heading to drag-and-drop the column to change the column order.

 

This entry was posted in Administration Guides, FortiManager and tagged , , on by .

About Mike

Michael Pruett, CISSP has a wide range of cyber-security and network engineering expertise. The plethora of vendors that resell hardware but have zero engineering knowledge resulting in the wrong hardware or configuration being deployed is a major pet peeve of Michael's. This site was started in an effort to spread information while providing the option of quality consulting services at a much lower price than Fortinet Professional Services. Owns PacketLlama.Com (Fortinet Hardware Sales) and Office Of The CISO, LLC (Cybersecurity consulting firm).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.