| Description | This article describes the log entry which indicates if the application control and detection has been triggered or Not. |
| Scope | FortiGate. |
| Solution |
Sample Log entry: (truncated to highlight important fields)
time=2016-02-02 10:43:43 .... app=HTTP utmaction=block ...dstip=12.32.15.16 duration=5 ... logid=13 ....dstport=80 type=traffic ... catdesc=Information Technology...appcat=Not.Scanned ... action=close ...hostname=dnl-09.geo.kaspersky.com
If the application control profile is not enabled on the firewall policy in the forward traffic the log will show as:
appcat="unscanned"
See the following log entry with Applist. This is an indication of the App control profile Test-APP being triggered .
date=2024-10-28 time=00:50:30 id=7430483405680148485 itime="2024-10-27 15:50:34" euid=1026 epid=104 dsteuid=3 dstepid=2573 appid=15895 appact="detected" apprisk="elevated" policytype="policy" eventtime=1730044230856110988 countapp=1 countssl=1 poluuid="2404e3fe-3008-51ed-53f6-8624143d11c8" srccountry="Reserved" dstcountry="Reserved" srcintf="ssl.root" dstintf="port8" applist="Test-APP"
Service is nothing but the services (smtp,https, http etc) which are being used in the firewall policies.
Related article: Technical Tip: Display application control signature logs from CLI |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.