Great proactive approach! Hopefully, it's all clear after
checking!Spoiler (Highlight to read)Fortinet’s published analysis and
looking for suspicious activity or known attack patterns that match your
environment. Examine system logs, unusual traffic...