FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
sferreira
Staff
Staff
Article Id 194339

Description


This article describes how to generate test logs and verify the Security Events logs under Log & Report -> Security Events section of the FortiGate GUI, after enabling 'Security Events' in the Firewall Policy Logging Options.

 

Scope

 

FortiGate.

Solution

 

  1. Open a Putty session on your FortiGate and run the command #diagnose log test. The following logs will be generated:


generating a system event message with level - warning
generating an infected virus message with level - warning
generating a blocked virus message with level - warning
generating a URL block message with level - warning
generating a DLP message with level - warning
generating an IPS log message
generating an application control IM message with level - information
generating an IPv6 application control IM message with level - information
generating deep application control logs with level - information
generating an antispam message with level - notification
generating an allowed traffic message with level - notice
generating a multicast traffic message with level - notice
generating a ipv6 traffic message with level - notice
generating a wanopt traffic log message with level - notification
generating a HA event message with level - warning
generating a VOIP event message with level - information
generating a DNS event message with level - information
generating authentication event messages
generating a Forticlient message with level - information
generating a URL block message with level - warning             

 

  1. Verify the Security Events under Log & Report -> Security Events -> Logs:  

 

Screenshot 2025-11-04 094841.png

 

Related articles:

Technical Tip: How to view Security Event logs on FortiGate 

Technical Tip: How to check event logs under 'Log & Report'