FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
sjoshi
Staff
Staff
Article Id 257020

Description

 

This article describes how to test antivirus log generation on FortiGate.

 

Scope

 

FortiGate.

 

Solution

 

There may be cases where FortiGate generates no logs. In this case, ensure the FortiGate Antivirus signatures are working properly using the following method.

 

  1. Configure the Antivirus with HTTP protocol enabled (in this article, HTTP traffic will be tested). The Antivirus profile mode must match the inspection mode setting (proxy or flow) in the associated firewall policy.
  2. Use deep inspection in the internet-facing policy and ensure the certificate is installed on the user's machine.

     

video1.gif

 

  1. Go to the following website to generate antivirus traffic: https://www.eicar.org/download-anti-malware-testfile/.

  2. Go to the Download area using the secure, SSL-enabled protocol HTTPS and select eicar.com.

  3. The AntiVirus block page should appear.

     

tor 4.png

 

  1. Antivirus logs should be visible in FortiGate:

 

1.PNG                                                                 

  1. If the log is not generating, for the Antivirus log to show up make sure that Web Filter and Application Control are disabled in the policy.
  2. If there are no entries in the AntiVirus logs, it indicates that the Antivirus has not detected any infected files.
  3. If Antivirus logs are empty, then the command 'diag log test' should be run and after a few minutes, Antivirus logs should be populating.

 

Note:

On the Antivirus profile used on the respective firewall policy, the following entries must also be added:

 

config antivirus profile 

    edit <profile_name_of_av>

        set av-virus-log enable

        set av-block-log enable

        set extended-log enable

next

end