Description | This article describes a technique to track when an admin user logged in and the reason for the same user session close due to the admin logging out, the admin disconnecting, or the admin time out. |
Scope | FortiGate |
Solution |
When a user successfully login to device, FortiGate will generate logid="0100032001" and assign specific Serial Number for the login attempt.
date=2025-03-21 time=00:41:47 eventtime=1742542907554349462 tz="-0700" logid="0100032001" type="event" subtype="system" level="information" vd="root" logdesc="Admin login successful" sn="1742542907" user="admin" ui="https(10.32.98.8)" method="https" srcip=10.32.98.8 dstip=10.40.19.6 action="login" status="success" reason="none" profile="super_admin" msg="Administrator admin logged in successfully from https(10.32.98.8)"
When the successfully logged-in admin user logs out of the device or user activity is terminated, FortiGate will generate a log for the administrator logged out, but the log ID will differ due to the reason for the logout; however, the serial number remains the same as the login event.
logID for Administrator admin logged out is 32003
To track when a successfully logged-in user logs out, a log is generated; serial number can be used as the filter to track admin login and logout log.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.