I would like to share only the most relevant security logs from FortiGate to a syslog collector, and I aim to minimize the volume of data being sent.
For example I am interested in User Activity Events, but I would like to filter them further, for example, to include only admin login events.
Is there any official Fortinet documentation that lists the subcategories or log IDs included in āUser
ā
Activity Eventsā, describing their purpose and content?
And more importantly:
Is it possible to apply filters directly on FortiGate (e.g., using CLI) to export only specific subcategories within a log group?
Any example or reference would be greatly appreciated.
Solved! Go to Solution.
config log syslogd filter
set filter "logid(xxx)"
end
Or refer below KB for comprehensive explanation or free style method.
https://community.fortinet.com/t5/FortiGate/Technical-Tip-In-log-filter-settings-the-logic-is-AND-be...
config log syslogd filter
set filter "logid(xxx)"
end
Or refer below KB for comprehensive explanation or free style method.
https://community.fortinet.com/t5/FortiGate/Technical-Tip-In-log-filter-settings-the-logic-is-AND-be...
Hi, is there maybe a command to use in order to not share the selected logs and share all the others, something like:
config log syslogd filter
set filter not "logid(xxx)"
end
? Many Thanks!
https://docs.fortinet.com/document/fortigate/6.4.16/cli-reference/273422104/config-log-syslogd-filte... , set filter-type exclude i think is what u need.
User | Count |
---|---|
2431 | |
1304 | |
778 | |
561 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.