FortiAnalyzer Best Practices Guide
FortiAnalyzer Best Practices Guide
FortiAnalyzer 7.6.0
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: techdoc@fortinet.com
Change Log 4
Overview 5
Additional information 5
Installation 6
Business Continuity 7
General Maintenance 8
Backing up and restoring the configuration 8
Secure password storage 8
Schedule maintenance tasks for off-peak hours 9
Maintain database integrity 9
Replace managed device 9
Add managed device 9
Replace the FortiAnalyzer device 10
Decommissioning FortiAnalyzer 10
ADOM Design 11
ADOM considerations 11
Log Management 12
Set up a log backup strategy 12
Set up redundancy 12
Set disk size and RAID level 12
Set log retention and storage 13
Determine the logs needed to meet business requirements 13
Allocate quota and set log retention policy 13
Use Fetcher Management for log fetching 13
Rebuild SQL database 14
Report Performance 15
Security Best Practices 16
Administrator access best practices 16
Encryption best practices 16
Other security best practices 17
VM Size and License 18
Resizing VM 18
This guide is a collection of best practices guidelines for using FortiAnalyzer. Use these best practices to help you get the
most out of your FortiAnalyzer products, maximize performance, and avoid potential problems.
Additional information
For product and feature guides, go to the Fortinet Document Library at https://docs.fortinet.com.
For procedures on how to implement these best practices, see the FortiAnalyzer Administration Guide in the Fortinet
Document Library.
For customer service and support, go to https://support.fortinet.com.
For technical notes, how-to articles, FAQs, and links to the technical forum and technical documentation, go to the
Fortinet Community at https://community.fortinet.com/.
Plan your installation carefully and select the FortiAnalyzer model(s) that meet your requirements.
l Plan the size of your installation appropriately. Ensure you plan for future management and logging requirements,
including consideration for:
l The number of connected devices.
Perform general maintenance tasks such as backup and restore so you can revert to a previous configuration if
necessary.
l Perform regular backups to ensure you have a recent copy of your FortiAnalyzer configuration.
l Verify the backup by comparing the checksum in the log entry with that of the backed up file.
l Set up a backup schedule so you always have a recent backup of the configuration.
See the FortiAnalyzer Administration Guide.
l If your FortiAnalyzer is a virtual machine, you can also use VM snapshots.
If you use ADOMs, a large number of ADOMs can significantly increase the size of configuration files which increases
backup and restore time. See ADOM considerations on page 11.
l Restoring a configuration must be done on a VM/appliance running the identical firmware version as where the
backup was performed. For example, if you back up a configuration on a FortiAnalyzer with firmware version 7.6.2,
the restore operation should be performed on a FortiAnalyzer running 7.6.2.
Passwords, as well as the private keys used in certificates, are encrypted using a pre-defined private key when stored on
the FortiAnalyzer, and encoded when displayed in the CLI and configuration file. This ensures that the password cannot
be decrypted unless the private key is known, and the password is not displayed in clear text anywhere.
To further enhance your password security, you should specify your own private key for the encryption process. This
ensures that your key is unique and known only by you. The key is also required on other FortiAnalyzers to restore the
system from a configuration file. In HA clusters, the same key should be used on all of the units.
Fortinet recommends scheduling maintenance tasks for off-peak hours whenever possible, including tasks such as:
l Configuration backup.
l Log deletion.
l Log rolling and related log upload.
l For FortiAnalyzer devices in Collector mode, log aggregation. Schedule this task after daily log rolling so that
analyzer has the latest rolled logs for that day.
To maintain database integrity, never power off a FortiAnalyzer unit without a graceful shutdown. Removing power
without a proper shutdown can damage FortiAnalyzer databases.
Always use the following CLI command to shutdown the device before removing power:
execute shutdown
Fortinet highly recommends connecting FortiAnalyzer units to an uninterruptible power supply (UPS) to prevent
unexpected power issues that might damage internal databases.
When you need to replace a standalone FortiGate device or a cluster member, the best practice is to add the new device
as a new member so as to preserve existing logs. Consider adding the old and new FortiGate devices into a group for
reporting purposes.
When Security Fabric is enabled on FortiGate, FortiAnalyzer requires using an administrator account on the FortiGate to
query the FortiGate for Security Fabric-related information.
Fortinet recommends using a dedicated Super_User administrator account on the FortiGate for FortiAnalyzer access.
This ensures that associated log messages are identified as originating from FortiAnalyzer activity. This dedicated
Super_User administrator account only needs Read Only access to System Configuration; all other access can be set to
None.
When you need to move logs to a new FortiAnalyzer device, use one of the following methods:
l Use log forwarding in aggregation mode. See Log Forwarding in the FortiAnalyzer Administration Guide.
l Use log fetching (Fetcher Management). See Fetcher Management in the FortiAnalyzer Administration Guide.
Decommissioning FortiAnalyzer
Enable ADOMs to support logs other than FortiGate logs (including Syslog and FortiClient EMS). You do not need to
separate ADOMs by FortiOS versions.
In version 5.4.x, the following applies to version 5.4.4 and higher. In version 5.6.x, it applies to
version 5.6.1 and higher:
When creating, editing, or viewing ADOMs, the version is displayed only if FortiManager
features are enabled.
If your devices have a mix of high-volume and low-volume log rates, put high-volume log rate devices in one ADOM and
low-volume log rate devices in another ADOM. This helps prevent quota enforcement from adversely affecting the low-
volume log devices. For best practices about setting quotas for ADOMs, see Allocate quota and set log retention policy
on page 13.
For more information, see the FortiAnalyzer Administration Guide.
ADOM considerations
A large number of ADOMs can significantly increase the size of configuration files which increases backup and restore
time. Do not create more ADOMs than your business needs.
Set up a log management strategy that gives a good balance of redundancy and performance. Retain logs log enough
for business requirements and archive older logs for better performance.
CLI Reference.
Set up redundancy
l For log storage redundancy, you can set this up at the disk level by selecting an appropriate RAID level.
l For log delivery redundancy, you can set this up in the following ways:
l Set FortiGates to send logs to multiple devices, provided the FortiGate models support this function.
l Use a hierarchical approach in your network design which includes using FortiAnalyzer devices in Collector
Fortinet recommends using the default RAID level specified in the FortiAnalyzer data sheet, that is, RAID 50. If your
configuration does not meet RAID 50 requirements, consider upgrading your hardware.
When planning for disk space requirements, consider future storage needs. Adding disks to an existing RAID array
requires rebuilding the RAID array and restoring backed up logs.
The disk space available for you to set log quotas depends on the RAID level and the reserved space for temporary files.
Temporary files are needed for indexing, reporting, and file management. In your planning, include both the disk space
for the original logs FortiAnalyzer receives (Archive) and the space required to index the logs (Analytics).
Fortinet recommends using the default ratio of Analytics : Archive for most deployments. If you plan to retain archive logs
for a much longer period than your analytical data, you might allocate a higher percentage to Archive.
If you need more disk space for a VM, you can add a virtual disk.
You can also increase the size of an existing virtual disk. No format is required.
Use the execute lvm extend command to add or extend virtual disks. See the FortiAnalyzer CLI Reference.
Consider carefully which types of logs to store on FortiAnalyzer. In some cases, you can be more selective about the
type and volume of logs sent from FortiGate to FortiAnalyzer. Reducing the type and volume of logs gives FortiAnalyzer
more resources to process the logs that meet your log storage, forensic, and reporting needs.
Ensure your quota settings is sufficient to fulfill your log retention policy. You must keep enough log data to meet your
organization’s reporting requirements. Configure quota settings and the log retention policy to ensure there is enough
time to generate all scheduled reports.
Log View > Storage Statistics shows graphs with trends to help you with this planning.
If you are using ADOMs, ensure the quota is sufficient for every ADOM. Allocating insufficient quota to an ADOM might
cause the following issues:
l Prevent you from meeting your log retention objective.
l Waste CPU resources enforcing quotas with log deletion and database trims.
l Adversely affect reporting when quota enforcement acts on analytical data before a report is complete.
For analytics, ensure the quota is sufficient and the retention period is long enough to complete all scheduled reports.
When reports are generated and the log retention period is past, there is no need to keep analytical data since it can be
regenerated from the original archived log data.
It is recommended that archive data be retained for a longer period than the analytic log data.
The archive data is needed to regenerate analytic data in the event of a rebuild, such as may
occur automatically during firmware upgrade.
To generate a report for a time period not covered by current analytical data:
l Use log fetching (Fetcher Management) to fetch archived logs to generate reports.
l Import log data from an external backup to generate reports.
Log fetching simplifies generating reports from log data for the following reasons:
l Log fetching allows you to specify the devices and time periods to be indexed.
l You can pull indexed logs into an ADOM with quota and log retention settings specifically set up to generate report
on older logs.
l Log fetching helps to avoid duplications that might occur with importing data from an external backup.
For information on Fetcher Management (log fetching) and importing a log file, see the FortiAnalyzer Administration
Guide.
Some firmware upgrades might change the SQL schema that indexes logs (analytics). If so, FortiAnalyzer automatically
rebuilds the SQL database. During the rebuild, searching and reporting functions are limited.
You rarely need to manually rebuild an SQL database. If you think there might be problems with the SQL database,
contact Customer Service & Support before considering a manual rebuild.
You might consider rebuilding the SQL database in the following situations:
l After moving a device to a new ADOM, you might need to rebuild the SQL database in the new ADOM.
l If disk space is running low, you might rebuild the SQL database to try free up disk space.
l Enable password policy and set requirements for the administrator password. The password policy lets you specify
the administrator's password minimum length, type of characters it must contain, and the number of days to
password expiry.
l Use CLI commands to configure the administrator's password lockout and retry attempts.
For example, to set the lockout duration to two attempts and set a two minute duration before the administrator can
log in again, enter the following CLI commands:
config system global
set admin-lockout-threshold 2
set admin-lockout-duration 120
end
l Set a lower idle timeout so that unattended workstations are logged out.
l Use multi-factor authentication authentication for administrators. For more information, see the FortiAuthenticator
Administration Guide in the Fortinet Document Library.
l Limit administrator access. For example, configure trusted hosts and allowaccess. See Restricting GUI access by
trusted hosts.
Set a strong encryption level. Use the SSL protocol version (TLS version) that meets PCI compliance or your
organization’s security requirements. For example:
config system global
set enc-algorithm high
set fgfm-ssl-protocol tlsv1.2
set oftp-ssl-protocol tlsv1.2
set ssl-protocol tlsv1.2
set webservice-proto tlsv1.2
set ssl-low-encryption disable
end
The enc-algorithm setting allows you to specify the security levels for cipher suites.
l set enc-algorithm low uses all OpenSSL ciphers.
l set enc-algorithm medium uses high and medium OpenSSL ciphers.
When FortiAnalyzer is behind a FortiGate, AV and IPS features can be enabled on the
FortiGate to further protect FortiAnalyzer from malware or intrusion attacks. See the
FortiGate Administration Guide.
Do not lose the administrator log in information as there is no password recovery mechanism
in FortiAnalyzer 5.4.0 and later.
Resizing VM
The FortiAnalyzer-VM allows you to add up to fifteen virtual log disks to a deployed instance. You can use the following
CLI command to see how many log disks have been added and how much disk space is available:
execute lvm info
When adding additional disks, use the following CLI command to extend the LVM logical volume:
execute lvm extend
Adding an extra disk or adding space to the current LVM disk will not impact current saved archive logs and analytics
logs. However, VM platforms may automatically restart or prompt you to restart when resizing an active VM. As a
precaution to prevent database corruption and preserve data in FortiAnalyzer, it is best to backup the logs and perform a
graceful shutdown before resizing.
To backup logs prior to resizing, enter the following commands in the FortiAnalyzer CLI:
execute backup logs <device name(s) | all> {ftp | scp | sftp} <ip/fqdn> <username>
<passwd> <directory> [vdlist]
execute backup reports <report schedule name(s) | all> {ftp | scp | sftp} <ip/fqdn>
<username> <passwd> <directory> [vdlist]
To perform a graceful shutdown, enter the following command in the FortiAnalyzer CLI:
execute shutdown
For more details about these commands, see the FortiAnalyzer CLI Reference on the Fortinet Document Library.
Copyright© 2025 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.