Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Si600
New Contributor II

Built-in Threat Report Analysis

I don't want to keep spamming this forum, but at the moment I can't find the documentation to help me, is there a sensible course I could do to learn how to see what our Fortis are doing?

 

Regardless.  I'm using the Built-in Threat Report to see if anything had happened and, clearly, yes it has.  However, it's not clear what it has happened to.  Specifically Intrusion 2, udp_flood, how do I match it up to the Victim IP and the Intrusion Source IP?

 

Forti Threat Report.png

 

Is this the right report to be using, and how can I tune it to get better or more meaningful results?  I feel I'm asking silly questions that I could easily RTFM the answer.

 

Cheers,

 

Simon.

3 REPLIES 3
AEK
SuperUser
SuperUser

As per my experience UDP flood is just due to DNS traffic (false positive).

You can confirm by directly viewing your FG Anomaly logs.

AEK
AEK
pdelapena
Staff
Staff

Hi @Si600 ,

If you have configured DoS policies, have you tried checking your Anomaly logs? That should give some information where the udp_flood attacks are coming from.

Regards,

Best regards,
Pau
Si600
New Contributor II

I'll be honest, I haven't configured anything on this at all, it's been done by my predecessor. DoS policies don't seem to be configured, or at at least, the section the manual says they go in is empty.

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors