Created on
08-23-2023
10:14 PM
Edited on
04-24-2025
07:37 AM
By
Jean-Philippe_P
Description |
This article describes how it is possible to monitor the top processes using CPU and memory using the CLI command 'diagnose sys top', but this is now achievable using the GUI. From FortiGate v7.0 and later, a new feature is introduced that can allow the admin to monitor and troubleshoot the issue using the ‘Process Monitor’ tool.
The Process Monitor page provides real-time insights into currently running processes, displaying their respective CPU and memory usage. This valuable feature equips administrators with the ability to not only observe but also manage system processes effectively. Within this page, a comprehensive list of active processes is conveniently presented, enabling administrators to easily browse, arrange, and refine the displayed information using filters.
For enhanced control, administrators can take action by terminating processes when necessary. This includes the option to terminate processes that are consuming a significant amount of memory, contributing to the optimization of system performance. |
Scope |
FortiGate 7.0 and above. |
Solution |
To navigate through this functionality within the FortiGate GUI, follow these steps:
It is possible to select the CPU/Memory widget on Dashboard Status to access the 'Process Monitor':
To verify all active UDP/TCP ports and processes in the Firewall, use the following command in the CLI:
diagnose sys tcpsock
diagnose sys udpsock
By effectively utilizing the Process Monitor page on the FortiGate GUI, administrators can proactively manage memory consumption and optimize overall system performance. This capability empowers administrators to ensure the efficient operation of their FortiGate devices while maintaining a keen understanding of active processes and their resource utilization. Related articles: Technical Tip: How to create a script to kill WAD process automatically |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.