Configuring Fortinet Syslogs

To get full accountability details (who made policy changes and when) and to utilize rule and object usage reporting, you must get your Fortinet devices to send syslogs to SecureTrack by defining SecureTrack as a syslog server on each device.

Syslog traffic (allowed traffic, denied traffic) must be sent to SecureTrack either directly from the FortiGate devices or from the FortiAnalyzer devices that receive the FortiGate logs.

Syslog traffic must be configured to arrive to the SecureTrack server that monitors the device (Central Server, Distribution Server or Remote Collector Server) from the IP and/or host name of the device.

For more information see Sending Additional Information via Syslog.

The firewalls in the organization must be configured to allow the relevant traffic.