Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Administration Guide

Endpoints widgets

Endpoints includes the following widgets:

Top Endpoint Vulnerabilities

Vulnerability information about FortiClient endpoints including vulnerability name and CVE ID.

Top Endpoint Vulnerabilities (FortiClient)

Vulnerability information about FortiClient endpoints including vulnerability name and CVE ID.

Only available in a Fabric ADOM.

Top Endpoint Devices with Vulnerabilities

Vulnerability information about FortiClient endpoints including source IP address and device.

Top Endpoint Devices with Vulnerabilities

(FortiClient)

Vulnerability information about FortiClient endpoints including source IP address and device.

Only available in a Fabric ADOM.

User Vulnerabilities Summary

User vulnerabilities summary.

All Endpoints

All endpoints.

All Endpoints (FortiClient)

All endpoints.

Top Endpoint Threats

Top threats from all endpoints.

Top Endpoints Applications

Top applications from all endpoints.

Only available in a Fabric ADOM.

Endpoints widgets

Endpoints includes the following widgets:

Top Endpoint Vulnerabilities

Vulnerability information about FortiClient endpoints including vulnerability name and CVE ID.

Top Endpoint Vulnerabilities (FortiClient)

Vulnerability information about FortiClient endpoints including vulnerability name and CVE ID.

Only available in a Fabric ADOM.

Top Endpoint Devices with Vulnerabilities

Vulnerability information about FortiClient endpoints including source IP address and device.

Top Endpoint Devices with Vulnerabilities

(FortiClient)

Vulnerability information about FortiClient endpoints including source IP address and device.

Only available in a Fabric ADOM.

User Vulnerabilities Summary

User vulnerabilities summary.

All Endpoints

All endpoints.

All Endpoints (FortiClient)

All endpoints.

Top Endpoint Threats

Top threats from all endpoints.

Top Endpoints Applications

Top applications from all endpoints.

Only available in a Fabric ADOM.