The issue of an almost empty daily summary report in FortiSASE can often be traced back to how logging is configured within the system. Specifically, if 'Log Allowed Traffic' is set to 'Security Events' for all policies, it means that only security-related events (such as threats or anomalies) are being logged, while normal, allowed traffic is not being recorded. Since most traffic in a typical network environment is allowed, this configuration would result in very little data being captured and subsequently reported in the daily summary.Here's a breakdown of why the other options are less likely to be the cause:B . There are no security profile groups applied to all policies: While applying security profiles is important for comprehensive protection, their absence does not directly affect the volume of data in reports unless specific logging settings are also misconfigured.C . The web filter security profile is not set to Monitor: This option pertains specifically to web filtering activities. Even if web filtering is not set to monitor mode, other types of traffic and logs should still populate the report.D . Digital experience monitoring is not configured: Digital Experience Monitoring (DEM) focuses on user experience metrics rather than general traffic logging. Its absence would not lead to an almost empty report.To resolve this issue, administrators should review the logging settings across all policies and ensure that 'Log Allowed Traffic' is appropriately configured to capture the necessary data for reporting purposes.Fortinet FCSS FortiSASE Documentation - Reporting and Logging Best PracticesFortiSASE Administration Guide - Configuring Logging Settings
The issue of an almost empty daily summary report in FortiSASE can often be traced back to how logging is configured within the system. Specifically, if 'Log Allowed Traffic' is set to 'Security Events' for all policies, it means that only security-related events (such as threats or anomalies) are being logged, while normal, allowed traffic is not being recorded. Since most traffic in a typical network environment is allowed, this configuration would result in very little data being captured and subsequently reported in the daily summary.
Here's a breakdown of why the other options are less likely to be the cause:
B . There are no security profile groups applied to all policies: While applying security profiles is important for comprehensive protection, their absence does not directly affect the volume of data in reports unless specific logging settings are also misconfigured.
C . The web filter security profile is not set to Monitor: This option pertains specifically to web filtering activities. Even if web filtering is not set to monitor mode, other types of traffic and logs should still populate the report.
D . Digital experience monitoring is not configured: Digital Experience Monitoring (DEM) focuses on user experience metrics rather than general traffic logging. Its absence would not lead to an almost empty report.
To resolve this issue, administrators should review the logging settings across all policies and ensure that 'Log Allowed Traffic' is appropriately configured to capture the necessary data for reporting purposes.
Fortinet FCSS FortiSASE Documentation - Reporting and Logging Best Practices
FortiSASE Administration Guide - Configuring Logging Settings