FortiAnalyzer
FortiAnalyzer can receive logs and Windows host events directly from endpoints connected to EMS, and you can use FortiAnalyzer to analyze the logs and run reports.
krangaraj_FTNT
Article Id 196868
Description
This article describes how to create an event handler which uses a generic text filter to match raw log data.

Solution
1. Go to FortiView > Log view page (FortiAnalyzer 5.0.7 or later, 5.2.x)

2. Select the log category in the left panel and on the top right corner click on Tools > Display Raw.

krangaraj_FD35256_faz-raw-select-combo.PNG


3. Once the raw logs are displayed you may choose the log file and the respective log data and copy the string you wish to match.

krangaraj_FD35256_faz-raw-log.PNG

4. Go to Event Management > Event Handler > Create New to open a new event handler.

5. Give an appropriate name and description and select the devices to which the event handler should be applied.

6. Under filters select the Log type, and select the condition as "Any of the Following Conditions" and in the "" put in the log file and log data copied in step 3.

krangaraj_FD35256_faz-gen-txt-filter.PNG

7. Click on the Notification tab and configure event notification details.

For example:
Set the threshold to generate an alert within the specified time period.
If you want an alert email to be sent in response to the event then please select the option "
Send Alert Email" and specify the 'from' and 'to' e-mail address and select the e-mail server from the drop-down box.

8. Click on 'Apply' and you will receive an alert mail whenever there is an alert message meeting the condition given.

Contributors