This article describes how traffic logging works on the FortiGate when running in NGFW policy-based mode, including when and where Application and URL category rating information will be logged.
FortiGate; NGFW policy-based mode
In NGFW policy-based mode, traffic will always be scanned by the IPS Engine as part of initial Security Policy assessment. If logging is enabled for the Security Policy that traffic is matched to (especially All Sessions), then Forward Traffic logs (available under Log & Report -> Forward Traffic) will be generated.
Notably, these Forward Traffic logs will generally include an entry under the Application Name section showing the Application signature that the session was matched to, but at the same time administrators may find that no Application Control logs (Log & Report -> Security Events -> Application Control) or Web Filter logs (Log & Report -> Security Events -> Web Filter) are being generated:
The reason this occurs is that in NGFW policy-based mode, these Security Event logs are only created if traffic matches a Security Policy that is configured with Application- and/or URL category-based filtering (for Application Control logs and Web Filter logs, respectively). If traffic matches to a Security Policy that does not include an Application or URL category filter then only Forward Traffic logs will be generated.
Ensure that an Application- and/or URL category-based Filter is applied to any Security Policy that a) should match based on that filter, and b) is required to generate Application Control and/or Web Filter security event logs. For guidance on adding these filters to Security Policies, refer to the following KB article: Technical Tip: How to block URL Category and Application in NGFW policy-based mode
The FortiGate still sends URL category rating requests to FortiGuard if at least one possibly-matching Security Policy includes any kind of URL category filter, even if traffic ends up matching a non-URL category-filtered policy, but the result of that request is only ever logged in Web Filter logs (never in Forward Traffic logs).
Example Scenario:
Consider the following example: Security Policies:
In the above screenshot, there are three Security Policies. Policy #2 (top) matches any traffic belonging to the 'Alcohol' URL category, Policy #3 (middle) matches traffic identified as the 'YouTube' Application signature, and Policy #1 (bottom) matches any/all other traffic. Depending on which policy is matched, the logging behavior will be slightly different:
**Application Control signatures are either standalone/parent signatures or child signatures of a broader parent. If parent signatures are included in Security Policies with the ACCEPT action then traffic may match either the parent or any associated child, whereas specifying a child signature only matches the child. For example, the 'SSL' parent signature includes the 'SSL_TLSv1.2' and 'SSL_TLSv1.3' child signatures.
Related Documents:
Technical Tip: NGFW policy-based mode Resource List
Technical Tip: How to block URL Category and Application in NGFW policy-based mode
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.