<190>date=2014-09-24 time=07:36:59 devname=fmg1 device_id=FMG-VM0000000000 log_id=0012021008 type=event subtype=dm pri=information user=" AutoUpdate" userfrom=" " msg=" AutoUpdate from fgt1(FG800C1234567890): revision(409)" device=" fgt1" serial=" FG800C1234567890" dev_oid=0 revision=409We don' t use the analyzer functions on the FMG so I can' t say if you can get the FMG itself to alert, but a syslog server should be able to watch incoming logs and alert based on messages like the above. We haven' t locked out the SysAdmin team from being able to access the Fortigates directly because we do use the workflow config in the FMG (with approvals) and we would still need to be able to do emergency changes. That being said when we first started using the FMG it was very hard to get them to stop modifying the Fortigates, they slowly stopped when they started to be named & shamed in outage reports because of regressions caused by not using the FMG. A Taser also helps to keep them away from the Fortigates. Regards, Matthew
User | Count |
---|---|
2054 | |
1173 | |
770 | |
448 | |
341 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.