Professional Documents
Culture Documents
Fortigate Daily Security Report: Report Date: 2019-01-04 Data Range: Jan 03, 2019 (Pia-Fg900D)
Fortigate Daily Security Report: Report Date: 2019-01-04 Data Range: Jan 03, 2019 (Pia-Fg900D)
Web Usage............................................................................................................................................................... 4
Top Allowed Websites...................................................................................................................................................... 4
Top Websites by Bandwidth............................................................................................................................................. 4
Top Blocked Websites...................................................................................................................................................... 4
Top Users by Blocked Requests....................................................................................................................................... 4
Top Users by Requests.................................................................................................................................................... 4
Top Users by Bandwidth................................................................................................................................................... 4
Top Video Streaming Web Sites by Bandwidth................................................................................................................ 4
Emails....................................................................................................................................................................... 5
Top Senders by Number of Emails................................................................................................................................... 5
Top Senders by Combined Email Size............................................................................................................................. 5
Top Recipients by Number of Emails................................................................................................................................ 5
Top Recipients by Combined Email Size.......................................................................................................................... 5
Threats...................................................................................................................................................................... 6
Malware Detected............................................................................................................................................................. 6
Malware Victims................................................................................................................................................................ 6
Malware Sources.............................................................................................................................................................. 6
Malware History................................................................................................................................................................ 6
Botnet Detected................................................................................................................................................................ 6
Botnet Victims................................................................................................................................................................... 6
Botnet C&C....................................................................................................................................................................... 7
Botnet History................................................................................................................................................................... 7
Intrusions Detected........................................................................................................................................................... 7
Intrusion Victims................................................................................................................................................................ 7
Intrusion Sources.............................................................................................................................................................. 7
Intrusions Blocked............................................................................................................................................................. 7
Intrusions By Severity....................................................................................................................................................... 8
Intrusion History................................................................................................................................................................ 8
0M
8M
16M
24M
32M
40M
48M
56M
64M
72M
80M
00
0K
40K
80K
120K
160K
200K
240K
280K
320K
360K
400K
00 :0
Bandwidth
:0 0
0
01 01
:0 :0
0 0
02
Number of Sessions
02 :0
:0 0
0
03 03
:0 :0
0 0
04 04
:0 :0
0 0
05 05
:0 :0
0 0
06 06
:0 :0
0
Bandwidth and Applications
0
07 07
:0 :0
0 0
09 09
:0 :0
0 0
10 10
:0 :0
0 0
11 11
:0 :0
0 0
12 12
:0 :0
0 0
13 13
:0 :0
0 0
14 14
:0 :0
0 0
15 15
:0 :0
0 0
16 16
:0 :0
0 0
17 17
:0 :0
0 0
18 18
:0 :0
0 0
19 19
:0 :0
0 0
20 20
:0 :0
0 0
21 21
:0 :0
Traffic Out
0 0
22 22
:0 :0
0 0
23 23
Traffic In
:0 :0
0 0
Page 1 of 10
Traffic Statistics
Summary Stats
Total Sessions 1.7 M
Total Bytes In: 114.7 GB Out: 19.8 GB
Average Sessions Per Hour 69.5 K
Average Bytes Per Hour In: 4.8 GB Out: 843.6 MB
Most Active Hour By Sessions 2019-01-03 16:00
Total Users 2.3 K
Total Applications 6.1 K
Total Destinations 5.6 K
900
800
700
Active Users
600
500
400
300
200
100
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Top Destinations by Bandwidth
Hostname (or IP) Traffic Out Traffic In Sessions
10.59.13.240 26.2 GB 14.1 K
118.69.35.142 22.6 GB 4
10.59.0.234 13.4 GB 11.2 K
10.59.0.232 12.7 GB 80
10.59.0.233 12.7 GB 511
14.248.64.244 4.8 GB 1.5 K
113.171.230.64 2.5 GB 371
210.211.103.82 2.4 GB 2
173.194.59.123 2.1 GB 5
10.0.0.3 1.6 GB 13
Malware Victims
# Victim Occurrence
1 10.59.0.100 7
Malware Sources
# Malware Source Host Name Counts
1 118.69.215.68 118.69.215.68 4
2 118.69.164.168 118.69.164.168 3
Malware History
10
6
# of Viruses
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Botnet Detected
# Botnet Name Counts
No matching log data for this report
Botnet Victims
# Victim Name Counts
No matching log data for this report
Botnet History
10
6
# of Botnet
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Intrusions Detected
# Intrusion Name Counts
No matching log data for this report
Intrusion Victims
# Intrusion Victim Counts
No matching log data for this report
Intrusion Sources
# Intrusion Source Counts
No matching log data for this report
Intrusions Blocked
# Intrusion Name Counts
No matching log data for this report
0
1
2
3
4
5
6
7
8
9
10
00
:0
0
01
:0
0
Intrusion History
02
:0
0
Intrusions By Severity
03
:0
0
04
:0
0
05
:0
0
06
:0
0
07
:0
0
Page 8 of 10
VPN Usage
Site-to-Site IPSec Tunnels by Bandwidth
# Tunnel Duration Traffic Out Traffic In
No matching log data for this report
System Events
# Event Name (Description) Severity Counts
1 Admin login failed 2
2 Configuration changed 2