Fortigate - External Logging - 'syslogd'

Information

Synchronize log messages with an external log server to have a backup of log messages for analysis if the FortiGate unit is compromised.

Solution

Use this command to enable external logging via syslog.

config log syslogd setting
set status enable
set csv {enable | disable}
set facility {alert | audit | auth | authpriv | clock | cron |
daemon | ftp | kernel | local0 | local1 | local2 | local3 |
local4 | local5 | local6 | local7 | lpr | mail | news | ntp |
syslog | user | uucp}
set port <port_integer>
set reliable {enable | disable}
set server <address_ipv4 | FQDN>
set source-ip <address_ipv4>
end

See Also

https://docs.fortinet.com/document/fortigate/6.4.0/hardening-your-fortigate/612504/hardening-your-fortigate

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12c.

Plugin: FortiGate

Control ID: 06167cf00cb24d9d7a229aa9634c397ab028c5c5efe2f1b56b1beef629a97970