After a generated a repot, you notice the information you were expecting to see in not included in it. However, you confirm that the logs are there:
Which two actions should you perform? (Choose two.)
Which two actions should an administrator take to vide Compromised Hosts on FortiAnalyzer? (Choose two.)
Refer to Exhibit:
Client-1 is trying to access the internet for web browsing.
All FortiGate devices in the topology are part of a Security Fabric with logging to FortiAnalyzer configured. All firewall policies have logging enabled. All web filter profiles are configured to log only violations.
Which statement about the logging behavior for this specific traffic flow is true?
Which two statement regarding the outbreak detection service are true? (Choose two.)
What are two effects of enabling auto-cache in a FortiAnalyzer report? (Choose two.)