I don't want to keep spamming this forum, but at the moment I can't find the documentation to help me, is there a sensible course I could do to learn how to see what our Fortis are doing?
Regardless. I'm using the Built-in Threat Report to see if anything had happened and, clearly, yes it has. However, it's not clear what it has happened to. Specifically Intrusion 2, udp_flood, how do I match it up to the Victim IP and the Intrusion Source IP?
Is this the right report to be using, and how can I tune it to get better or more meaningful results? I feel I'm asking silly questions that I could easily RTFM the answer.
Cheers,
Simon.
As per my experience UDP flood is just due to DNS traffic (false positive).
You can confirm by directly viewing your FG Anomaly logs.
Hi @Si600 ,
If you have configured DoS policies, have you tried checking your Anomaly logs? That should give some information where the udp_flood attacks are coming from.
Regards,
I'll be honest, I haven't configured anything on this at all, it's been done by my predecessor. DoS policies don't seem to be configured, or at at least, the section the manual says they go in is empty.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1747 | |
1114 | |
760 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.