Support
 
Support Get Quote
 
 
 
 

Analyzing FortiGate syslog

Last updated on:
 

What is FortiGate syslog?

FortiGate syslog is the logging mechanism used by Fortinet firewalls to record critical operational, security, and traffic data. These logs from FortiGate devices are forwarded to external collectors or syslog servers in the structured key-value pair format. This ensures log data is retained securely, not only for compliance but also for troubleshooting and advanced security analysis.

Types of FortiGate logs

FortiGate logs are classified into the following types based on their functions.

Log type Function Events involves
Traffic logs These are the most voluminous logs, recording all network sessions that pass through the FortiGate firewall Allowed, denied, or processed traffic controlled by a specific firewall policy
Unified threat management (UTM) logs These logs are generated when a security profile inspects traffic and finds a violation or threat Malware detection, intrusion attempts, and unauthorized access to prohibited websites or applications
Event logs These logs track internal changes, system state, and administrative activity, vital for auditing and system health checks User authentication and configuration changes
VPN logs These logs audit VPN traffic and SSL-VPN tunnels Monitors remote access and site-to-site connectivity

FortiGate syslog message format

FortiGate logs use a proprietary key-value pair (KVP) format. This structure makes the logs highly readable for automated parsers.

Example log entry:

date=2025-12-23 time=17:45:18 devname="ELA" devid="FG234234567890" logid="0000000045" type="traffic" subtype="forward" level="warning" vd="root" srcip=192.178.1.200 srcport=52341 srcintf="port1" dstip=8.8.8.8 dstport=443 dstintf="wan1" proto=6 action="accept" policyid=1 sessionid=10045 duration=30 sentbyte=2500 rcvdbyte=2200

Key field definitions

Field Description
date/time The exact timestamp when the event was generated
devname The hostname of the FortiGate device
logid A unique 10-digit identifier for the specific log message type
type The broad category (e.g., traffic, UTM, event)
subtype The specific sub-category (e.g., forward, virus, web filter, system)
level The severity level of the log
action The outcome of the event (e.g., accept, deny, close, block)
srcip / dstip The source and destination IP addresses involved
policyid The specific firewall policy ID that triggered the log

FortiGate severity levels

FortiGate assigns a severity level to every log. When configuring the syslog server, FortiGate logs can be filtered using these levels to manage log volume.

FortiGate level Syslog severity Numeric code Description
emergency Emergency 0 System is unusable
alert Alert 1 Action must be taken immediately
critical Critical 2 Critical conditions (e.g., hardware failure)
error Error 3 Error conditions
warning Warning 4 Warning conditions
notification Notice 5 Normal but significant conditions
information Info 6 Informational messages
debug Debug 7 Debug-level messages

FortiGate syslog and EventLog Analyzer

While FortiGate generates raw data and acts as a syslog forwarder, ManageEngine EventLog Analyzer provides the necessary layer of intelligence, transforming simple log files into actionable security insights.

In this integrated architecture, EventLog Analyzer functions as the dedicated, centralized syslog analyzer that indexes and parses the data using native parsers designed specifically for FortiGate's proprietary key-value format. This eliminates the manual effort of field extraction, ensuring immediate visibility into fields, making logs instantly searchable and ready for correlation and reporting.

Further, the logs are transmitted to EventLog Analyzer via TCP/TLS, ensuring reliable and secure log transportation.

ManageEngine EventLog Analyzer provides sophisticated syslog server and analyzer functionalities that provide comprehensive visibility into FortiGate activities and fortifies your network against security breaches.

How to configure FortiGate syslog in EventLog Analyzer

Prerequisites

Ensure the following before configuring the FortiGate device to ensure the receiver i.e., EventLog Analyzer is ready for log reception.

Configure the listening port: EventLog Analyzer server must be actively listening for incoming syslogs on UDP port 514.

Clear the firewall path: All intermediate and host-based firewalls must be open to allow traffic on UDP port 514 from FortiGate to the EventLog Analyzer server.

How to configure

For a step-by-step walk through on configuring FortiGate syslog in EventLog Analyzer, visit this page.

Next steps

To ensure successful configuration, trigger a test log message on the FortiGate device. Then, confirm if the logs appear in the EventLog Analyzer interface to validate that the entire setup is working properly.

Common troubleshooting tips for FortiGate log collection

Here are some common tips to ensure seamless FortiGate log collection.

  • Ensure that FortiGate has a valid transmission route to the syslog server. Use the CLI command execute ping [Server_IP] to test connectivity.
  • Logging every single traffic session can tax the CPU. If resources are low, change the severity level to Warning or disable Log Allowed Traffic on low-risk policies.
  • If the SIEM tool isn't parsing logs correctly, ensure the format is set to default rather than RFC5424 unless the parser requires it.

FortiGate logs and EventLog Analyzer reports

EventLog Analyzer transforms raw FortiGate logs into visual, intelligence-driven reports, moving security teams from searching text to analyzing meaningful data.

Traffic logs are parsed and indexed to Firewall Allowed Traffic and Firewall Denied Traffic report groups with reports on Traffic Trend and Top Traffic based on Source, Destination, Protocol, and Port.

Figure 1 depicts EventLog Analyzer's report on Top Traffic based on the Source under Firewall Allowed Traffic report group.

EventLog Analyzer's Top Traffic report based on Fortinet's traffic logs
Figure 1: Top Traffic based on Source report in EventLog Analyzer

FortiGate's UTM logs are processed to generate detailed reports on malware attacks, IDS/IPS reports, and firewall security reports in EventLog Analyzer. These help security analysts detect and visualize malware and intrusion attempts, instantly mapping the threat source and severity.

Figure 2 shows EventLog Analyzer's Critical Attacks report in the Firewall IDS/IPS Reports group.

EventLog Analyzer's Critical Attacks report based on FortiGate's UTM logs
Figure 2: Critical Attacks report in EventLog Analyzer

Event logs from Fortinet firewall are used for identifying who made what configuration change and when for troubleshooting, threat detection, and change management.

Figure 3 shows EventLog Analyzer's Policy Modified report in the Firewall Policy Management report group, which provides granular details on the modification of firewall policies.

EventLog Analyzer's Firewall Policy Modified report based on Fortinet event logs
Figure 3: Fortinet Firewall Policy Modified report in EventLog Analyzer

VPN logs from Fortinet devices are used to generate detailed reports on VPN activities such as VPN logons, logoffs, failed logons, logon trends based on devices and users, and more in EventLog Analyzer.

Figure 4 shows a VPN report in EventLog Analyzer that provides a graph on the VPN logon trend.

EventLog Analyzer's VPN Logon Trend report based on FortiGate VPN logs
Figure 4: Fortinet VPN Logon Trend report in EventLog Analyzer

EventLog Analyzer also offers predefined alerts to monitor and detect suspicious activities on Fortinet devices in real time.

Figure 5 depicts a few critical alert criteria predefined in EventLog Analyzer to track Fortinet activities.

Predefined alert profiles in EventLog Analyzer to detect suspicious Fortinet activities
Figure 5: Predefined alert profiles for Fortinet in EventLog Analyzer

Why choose EventLog Analyzer

The combination of a FortiGate syslog forwarder and EventLog Analyzer creates a highly robust and efficient security monitoring solution that guarantees:

  • Log integrity: EventLog Analyzer's internal collector ensures logs are delivered securely via TLS, making them tamper-proof and credible for forensic analysis.
  • Proactive threat detection: EventLog Analyzer applies prebuilt detection rules against FortiGate data to ensure zero-day threats and sophisticated attacks are detected and contained in real time.
  • Threat investigation: Analysts can use EventLog Analyzer's powerful forensic search to query months of indexed FortiGate data in seconds, moving from alert to resolution far faster investigation and threat remediation.
  • Simplified compliance: EventLog Analyzer automatically generates necessary audit reports for standards like the PCI DSS, HIPAA, and SOX using the securely archived FortiGate data, facilitating compliance management.

What's next?

Make EventLog Analyzer your central syslog server to instantly index, manage, and analyze high-volume FortiGate syslogs to secure your enterprise with powerful, real-time security analytics.

Explore EventLog Analyzer's comprehensive syslog capabilities and powerful log management features to fortify your enterprise's security posture.

EventLog Analyzer Trusted By

Los Alamos National Bank Michigan State University
Panasonic Comcast
Oklahoma State University IBM
Accenture Bank of America
Infosys
Ernst Young

Customer Speaks

  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
    Citadel
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

Awards and Recognitions

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
A Single Pane of Glass for Comprehensive Log Management