Fortinet black logo

Handbook

Monitoring

6.0.0
Copy Link
Copy Doc ID 4afb0436-a998-11e9-81a4-00505692583a:499331
Download PDF

Monitoring

With network administration, the first step is installing and configuring the FortiGate to be the protector of the internal network. Once the system is running efficiently, the next step is to monitor the system and network traffic. When a threat or vulnerability is discovered, you can make configuration changes as necessary.

This chapter discusses the various methods of monitoring both the FortiGate and the network traffic through a range of different tools available within FortiOS.

This section includes the topics:

Monitoring

With network administration, the first step is installing and configuring the FortiGate to be the protector of the internal network. Once the system is running efficiently, the next step is to monitor the system and network traffic. When a threat or vulnerability is discovered, you can make configuration changes as necessary.

This chapter discusses the various methods of monitoring both the FortiGate and the network traffic through a range of different tools available within FortiOS.

This section includes the topics: