/
c. Intrusion Prevention Services (IPS)

c. Intrusion Prevention Services (IPS)

Records intrusion prevention events.

 

Sample Events

date=2019-05-15 time=17:56:41 logid="0419016384" type="utm" subtype="ips" eventtype="signature" level="alert" vd="root" eventtime=1557968201 severity="critical" srcip=10.1.100.22 srccountry="Reserved" dstip=172.16.200.55 srcintf="port10" srcintfrole="lan" dstintf="port9" dstintfrole="wan" sessionid=4017 action="dropped" proto=6 service="HTTP" policyid=1 attack="Adobe.Flash.newfunction.Handling.Code.Execution" srcport=46810 dstport=80 hostname="172.16.200.55" url="/ips/sig1.pdf" direction="incoming" attackid=23305 profile="block-critical-ips" ref="http://www.fortinet.com/ids/VID23305" incidentserialno=582633933 msg="applications3: Adobe.Flash.newfunction.Handling.Code.Execution," crscore=50 craction=4096 crlevel="critical"

date=2020-05-22 time=15:30:29 devname="PSA-OR-FTGW001" devid="FGVM4VTM20001228" logid="0422016400" type="utm" subtype="ips" eventtype="botnet" level="warning" vd="root" eventtime=1590132630731725530 tz="+0800" msg="Botnet C&C Communication." severity="high" srcip=1.1.1.1 srccountry="Australia" dstip=2.2.2.2 srcintf="port1" srcintfrole="undefined" dstintf="port2" dstintfrole="undefined" sessionid=51001 action="detected" srcport=51001 dstport=20 proto=6 service="tcp/20" vrf=32 policyid=0 profile="sensor" direction="N/A" attack="test_botnet" attackid=12345 user="user" group="group" ref="http://www.fortinet.com/be?bid=12345" crscore=50 craction=4 crlevel="critical"

Fields

Field

Description

Field

Description

DATE

Event date, in the format YYYY-MM-DD

TIME

Event time, in the format HH:MM:SS

SYSTEM

The source system

TABLE

FortiGateIPS

CRITICALITY

 

LOGID  

Unique 10-digit identifier (log type, subtype/event type and message ID) for that specific log and includes information about the log entry

TYPE  

Represented by the first two digits of the log ID

SUBTYPE  

Represented by the first/second two digits of the log ID

EVENTTYPE  

Represented by the second two digits of the log ID

DEVNAME  

 

DEVID  

Serial number of the device for the traffic's origin

LEVEL  

Security level rating

VD  

Name of the virtual domain in which the log message was recorded

EVENTTIME  

Epoch time the log was triggered by FortiGate

TZ

 

SEVERITY

Severity of the attack

SRCIP

Source IP

SRCCOUNTRY

 

SRCPORT

Source port

SRCINTF

Source interface

SRCINTFROLE

 

DSTIP

Destination IP

DSTPORT

Destination port

DSTINTF

Destination interface

DSTINTFROLE

 

SESSIONID

Session ID

ACTION

Security action performed by IPS

PROTO

Protocol number

SERVICE

Service name

VRF

 

POLICYID

Policy ID

ATTACK

Attack name

HOSTNAME

 

URL

 

DIRECTION

 

ATTACKID

Attack ID

USER

User name

GROUP

User group name

PROFILE

Profile name for IPS

REF

URL of the FortiGuard IPS database entry for the attack

INCIDENTSERIALNO

Incident serial number

CRSCORE

Client Reputation Score

CRACTION

 

CRLEVEL

Client Reputation Level

ERROR

URL rating error message

MSG

Log message for the attack

SNAREDATAMAP

All other data in the event will be pushed to this field

Notes

Log Message Reference Documentation: https://docs.fortinet.com/document/fortigate/6.4.2/fortios-log-message-reference

 

Related content

Log Types: Cisco FTD IDS - Intrusion Detection System log type
Log Types: Cisco FTD IDS - Intrusion Detection System log type
More like this
p. Internet Content Adaptation Protocol (ICAP)
p. Internet Content Adaptation Protocol (ICAP)
More like this
Log Types: Cisco FTD IPS - Intrusion Protection System log type
Log Types: Cisco FTD IPS - Intrusion Protection System log type
More like this
i. Web Application Firewall (WAF)
i. Web Application Firewall (WAF)
More like this