Fortview Reference

Columns displayed

The following columns appear in the initial window of the dashboards. Some columns may only be visible by selecting them from the column drop-down menu. Options vary depending on the dashboard selected.

 

Column name                          Description

Action                                         Displays the type of response taken to a security event. The types of pos- sible actions are as follows:

  • Allowed: No threat was detected and the connection was let through.
  • Blocked: A threat was detected and the connection was not let through.
  • Reset: A possible issue was detected and the connection was reset.
  • Traffic Shape: Some data packets may have been delayed to improve system-wide performance.

 

Note: This column is only available in the All Sessions console.

Application                              Displays the application name and service. When Time Display is set to now, you can access further information about an application by selecting the column entry.

Application Category               Displays the type of application used in the selected session, e.g. video player, social media.

Note: This column is only available in the All Sessions console.

Application ID                           Displays the identification number associated with the application used in the selected session.

Note:This column is only available in the All Sessions console.

Application Risk

This entry was posted in FortiOS 5.4 Handbook and tagged , , on by .

About Mike

Michael Pruett, CISSP has a wide range of cyber-security and network engineering expertise. The plethora of vendors that resell hardware but have zero engineering knowledge resulting in the wrong hardware or configuration being deployed is a major pet peeve of Michael's. This site was started in an effort to spread information while providing the option of quality consulting services at a much lower price than Fortinet Professional Services. Owns PacketLlama.Com (Fortinet Hardware Sales) and Office Of The CISO, LLC (Cybersecurity consulting firm).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.