FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
skrymi
Staff
Staff
Article Id 270703
Description This article describes how to use the filter in the Dashboard -> Assets & Identities.
Scope FortiGate.
Solution

If one wants to monitor the current status of users and devices connected to the network, a new feature is available on the 7.4.0 OS version. All of the widgets can be expanded to be viewed as monitors.

In the monitor view, it is possible to create firewall addresses, de-authenticate a user, or remove a device from the network. Asset and Identities can be found under Dashboard GUI. 

 

Below are some widgets that can show the following information :

 

Device Inventory: List Hardware and software connected to the network.

Firewall users:  List and monitor users logged in to the network.

Quarantine: Monitor quarantine devices.

Matched NAC Devices: Monitor VLANs assigned to devices by FortiSwitch NAC policies.

 

Device Inventory Monitoring and Filtering.

First, it is necessary to enable device detection on the interface: Network -> Interface -> Device Detection Enable.

 
 

picture 1.png

 

By doing this, it will allow FortiOS to monitor the network and to collect information regarding the operational devices on the network as MAC Address, IP Address, Hostname, OS, Username, Vulnerabilities, Status, Endpoint Tags, and FortiClient User information.  The widget is only available when the Interface Role is LAN, DMZ, or Undefined.

 

 picture2.png

 

When clicking on the MAC address under Assets, it is possible to find more information regarding the device, like Operation System, Interface, Online Interface, etc. In order to get information for a specific device, it is possible to use a filter for different columns like hostname, MAC address or IP address, device, Software OS, and Interface:

 

picture3.png

 

picture4.png

 

Each view has a drop-down option to view the information within different time frames (Latest, 1 hour, 24 hours, and 7 days). Vulnerability information is displayed when applicable. The page displays user and device relationships, such as which users are logged in to multiple devices or if multiple users are logged in to single devices.

 

picture5.png

 

Related document:

Assets & Identities.