Fortview Reference

Risk

Displays the application risk level. You can hover the mouse cursor over the entry in the column for additional information, and select the column

header to sort entries by level of risk.

Risk uses a 5-point risk rating. The rating system is as follows:

  • Critical: Applications that are used to conceal activity to evade detection.
  • High: Applications that can cause data leakage, are prone to vulnerabilities, or may download malware.
  • Medium: Applications that can be misused.
  • Elevated: Applications that are used for personal communications or can lower productivity.
  • Low: Business-related applications or other harmless applications.

Bandwidth                                  Displays information for bandwidth calculated on a per-session level, providing administrators the ability to sort realtime bandwidth usage in des- cending order.

Column name                          Description

Browsing Time                        Displays the amount of time a user has spent browsing a web site (in seconds).

Note: This column is only available in the Web Sites console, in Cat– egories view..

Bytes

(Sent/Received)

Displays the size of sent and received data packets, as measured in bytes. Select the column header to sort the entries by size.

Note: This information is available on some consoles as two separate columns: Sent and Received.

Category                                  Displays the category descriptor appropriate to whatever console is being displayed. For example, threat categories are displayed in the Threats con- sole.

Cloud User                              Displays the users accessing cloud applications by IP address.

Note: This column is only available in the Cloud Applications console, in

Users view.

Configuration Changes          Displays the number of configuration changes made by the user. You can hover the mouse cursor over an entry for additional information.

Note: This column is only available in the Admin Logins console.

Connections                            Displays the number of VPN connections made by the selected user..

Note: This column is only available in the VPN console.

Country                                    Displays the country from which the selected traffic is originating.

Note: This column is only available in the Countries console.

Destination                              Displays the destination name, IP address and geographic region.

Destination Country                 Displays the country session data is being sent to.

Note: This column is only available in the All Sessions console.

Destination Interface               Displays which interface session data is being sent through, e.g. wan1.

Destination Port                        Displays the port number of the destination server being used to accept data.

Note: This column is only available in the All Sessions console.

Device                                      Displays the device IP address or Fully Qualified Domain Name (FQDN).

Column name                          Description

Domain                                    Displays the domain associated with the selected web site, e.g. google.- com.

Note: This column is only available in the Web Sites console.

DST Nat IP

NAT Destination

Displays the Network Address Translation (NAT) IP address associated with the destination server.

Note: This column is only available in the All Sessions console.


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

This entry was posted in FortiOS 5.4 Handbook and tagged , , on by .

About Mike

Michael Pruett, CISSP has a wide range of cyber-security and network engineering expertise. The plethora of vendors that resell hardware but have zero engineering knowledge resulting in the wrong hardware or configuration being deployed is a major pet peeve of Michael's. This site was started in an effort to spread information while providing the option of quality consulting services at a much lower price than Fortinet Professional Services. Owns PacketLlama.Com (Fortinet Hardware Sales) and Office Of The CISO, LLC (Cybersecurity consulting firm).

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.