0% found this document useful (0 votes)
24 views16 pages

360 Degree Activities Report - Daily - 2025-07-01 - 2025-07-02 - Root - 1751440166378 - 61

The 360 Degree Activities Report for the FortiGate-100F device details application and web usage, highlighting significant traffic from social media and video streaming applications. It identifies the most active users and applications, as well as potential risks associated with high bandwidth usage. The report emphasizes the importance of monitoring user behavior and implementing appropriate security measures to mitigate risks from insider threats and data exfiltration.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views16 pages

360 Degree Activities Report - Daily - 2025-07-01 - 2025-07-02 - Root - 1751440166378 - 61

The 360 Degree Activities Report for the FortiGate-100F device details application and web usage, highlighting significant traffic from social media and video streaming applications. It identifies the most active users and applications, as well as potential risks associated with high bandwidth usage. The report emphasizes the importance of monitoring user behavior and implementing appropriate security measures to mitigate risks from insider threats and data exfiltration.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Device: FortiGate-100F | FortiGate Cloud

360 Degree Activities Report

2025-07-01 00:00 - 2025-07-02 00:00 America/Bogota

Generated on: 2025-07-02 02:09

360 Degree Activities Report Page 1


Device: FortiGate-100F | FortiGate Cloud

360 Degree Activities Report

Application Usage
The FortiGuard research team categorizes applications into
different categories based on the application behavioral Top Application Categories
characteristics, underlying technology, and the related traffic
transaction characteristics. The categories allow for better
application control. FortiGuard maintains thousands of
application sensors and can even perform deep application
inspection. For example, IT managers can get unprecedented unscanned = 41.4 GB(94.1%)
visibility into filenames sent to the cloud or the titles of videos
social. media = 1.7 GB(3.9%)
being streamed.
collaboration = 302.4 MB(0.7%)

network. ...ice = 273.6 MB(0.6%)

general. ...est = 184 MB(0.4%)

Other = 172.2 MB(0.4%)


For application category details, see:
http://www.fortiguard.com/encyclopedia/application

Most Used High Bandwidth applications


Application Category Risk Traffic(Sent/Received) %
facebook social.media 3 13.3 MB / 910.6 MB 2.1%
https.browser web.client 3 1.5 MB / 23.9 MB 0.1%
capcut genai 3 243 KB / 1.3 MB 0.0%
google.photos storage.backup 3 1.1 MB / 120 KB 0.0%
ssl_tlsv1.3.pqc network.service 3 37 KB / 941 KB 0.0%
ssl_tlsv1.3 network.service 3 150 KB / 291 KB 0.0%
http.browser web.client 3 65 KB / 290 KB 0.0%
amazon.cloudfront cloud.it 3 6 KB / 322 KB 0.0%
amazon.aws_s3 cloud.it 3 39 KB / 86 KB 0.0%
dns.over.https network.service 3 12 KB / 26 KB 0.0%
samsung.cloud storage.backup 3 17 KB / 19 KB 0.0%
gmail email 3 1 KB / 8 KB 0.0%
tiktok social.media 2 32.3 MB / 779 MB 1.8%
whatsapp_file.transfer collaboration 2 9.8 MB / 290.5 MB 0.7%
youtube video/audio 2 7.2 MB / 131.3 MB 0.3%
google.accounts general.interest 2 2.3 MB / 122 MB 0.3%
google.services general.interest 2 12.3 MB / 44.1 MB 0.1%
facebook_video.play video/audio 2 63 KB / 4.3 MB 0.0%
google.play general.interest 2 1.9 MB / 511 KB 0.0%
telegram collaboration 2 58 KB / 937 KB 0.0%
Other Other 4.1 GB / 37.5 GB 94.7%
Total: 4.2 GB / 39.7 GB

Sent Received

360 Degree Activities Report Page 2


Device: FortiGate-100F | FortiGate Cloud

Application Category Breakdowns


Understanding application subcategories can give invaluable
insights into how efficiently your corporate network is operating. Remote Access Applications
Certain application types (such as P2P or gaming applications) No Data
are not necessarily conducive to corporate environments and
can be blocked or limited in their scope. Other applications may
have dual purpose uses (such as video/audio streaming or social
media apps) and can be managed accordingly. These charts
illustrate application categories sorted by the amount of
bandwidth they used during the discovery period.

Top Social Media Applications Top Video/Audio Streaming Applications

facebook = 923.9 MB(53.2%)


youtube = 138.4 MB(96.9%)
tiktok = 811.3 MB(46.8%)
facebook_...lay = 4.4 MB(3%)
instagram = 216 KB(0%)
amazon. video = 47 KB(0%)
kuaishou = 12 KB(0%)

Proxy Applications Top Peer to Peer Applications


No Data No Data

360 Degree Activities Report Page 3


Device: FortiGate-100F | FortiGate Cloud

High Risk Application


The FortiGuard research team assigns a risk rating of 0 to 4 to an application based on the application behavioral characteristics.
The risk rating can help administrators to identify the high risk applications quickly and make a better decision on the application
control policy. Applications listed below were assigned a risk rating of 3 or higher.

High Risk Application In Use


No Data

360 Degree Activities Report Page 4


Device: FortiGate-100F | FortiGate Cloud

Web Activities
Identifying which web categories and websites are accessed by applications provides additional data points for administrators to
understand the network traffic usage. Defining appropriate application policies along with web filtering policies will greatly reduce the
business risk. Fortinet's proprietary web filtering database is developed by the FortiGuard research team. The database contains
more than 47 million rated websites with real-time updates; the websites are categorized into 76 web categories to allow highly-
granular web filtering policies. Both passthrough and blocked websites are included in the calculation.

Most Visited Web Categories

100%

Unrated = 3(100%)

Most Visited Websites


Web Site Visits % Estimated Browsing Time %
purezzastore. shop 3 100.0% 00h 00m 00s N/A
Total: 3 Total: 00h 00m 00s

360 Degree Activities Report Page 5


Device: FortiGate-100F | FortiGate Cloud

Web Activities
Most Visited Web Categories and Web Sites
Category % Web Site % Visits Estimated Browsing Time
Unrated 100% purezzastore. shop 100% 3 00h 00m 00s
Total: 3

Visits

360 Degree Activities Report Page 6


Device: FortiGate-100F | FortiGate Cloud

30 percent of data breaches involve organization insiders acting negligently or maliciously. Insiders pose a unique threat to
organizations because they have access to proprietary systems and often are able to bypass security measures creating a security
blind spot to the risk and security teams. User Behavior Analytics protects organizations from insider threats by continuously
monitoring users and endpoints.

Active Users
Most Active Application Users
User Session %
<N/A> 206268 99.9%
financiera2 124 0.1%
financiera1 47 0.0%
Total: 206439

Most Active Web Users


User Visits % Estimated Browsing Time %
<N/A> 3 100.0% 00h 00m 00s N/A
Total: 3 Total: 00h 00m 00s

360 Degree Activities Report Page 7


Device: FortiGate-100F | FortiGate Cloud

Applications by Active Users


Most Applications by Most Active Users
User % Application % Traffic
<N/A> 98.3% udp 45.2% 1.2 GB/18.4 GB
https 31.1% 2.3 GB/11.2 GB
http 14.6% 68 MB/6.2 GB
tcp 2.8% 203.6 MB/1 GB
facebook 2.1% 13.3 MB/910.6 MB
Other 4.2% 135.7 MB/1.7 GB
financiera2 1.4% smb 100% 333.3 MB/307.2 MB
udp 0.0% 109 KB/0 KB
http 0.0% 2 KB/0 KB
financiera1 0.3% smb 100% 53.2 MB/66.5 MB
udp 0.0% 17 KB/0 KB
http 0.0% 1 KB/2 KB
Total: 4.2 GB/39.7 GB

Sent Received

360 Degree Activities Report Page 8


Device: FortiGate-100F | FortiGate Cloud

Websites by Active Web Users


Most Visited Web Sites by Most Active Users
User % Web Site % Visits Estimated Browsing Time
<N/A> 100% purezzastore. shop 100% 3 00h 00m 00s
Total: 3

Visits

360 Degree Activities Report Page 9


Device: FortiGate-100F | FortiGate Cloud

Active Users of Most Applications


Most Active Users of Most Applications
Application % User % Traffic
udp 44.5% <N/A> 100% 1.2 GB/18.4 GB
financiera2 0.0% 109 KB/0 KB
financiera1 0.0% 17 KB/0 KB
https 30.6% <N/A> 100% 2.3 GB/11.2 GB
http 14.4% <N/A> 100% 68 MB/6.2 GB
financiera1 0.0% 1 KB/2 KB
financiera2 0.0% 2 KB/0 KB
tcp 2.7% <N/A> 100% 203.6 MB/1 GB
facebook 2.1% <N/A> 100% 13.3 MB/910.6 MB
Other 5.8% 522.2 MB/2 GB
Total: 4.2 GB/39.7 GB

Sent Received

360 Degree Activities Report Page 10


Device: FortiGate-100F | FortiGate Cloud

Active Users of Most Visited Web Sites


Most Active Users of Most Visited Web Sites
Web Site % User % Visits Estimated Browsing Time
purezzastore. shop 100% <N/A> 100% 3 00h 00m 00s
Total: 3

Visits

360 Degree Activities Report Page 11


Device: FortiGate-100F | FortiGate Cloud

The rise of modern malware has reshaped the threat landscape. These modern threats bypass traditional antimalware strategies and
establish a foothold within the enterprise. They are used by criminals and nation-states to steal sensitive information and attack
assets. Fortinet next-generation firewall provides multi-level protection to combat these advanced persistent threat - the reliable
visibility and control of all traffic on the network regardless of evasive tactics. The FortiGuard AntiVirus Service employs advanced
virus, spyware, and heuristic detection engines to enable FortiGate systems to detect and prevent both new and evolving threats. For
AntiVirus see: http://www.fortiguard.com/antivirus/ .

Threat Detection and Prevention


Top Threats
Threat Category Level Score %
Failed Connection Attempt Firewall Control Low 15680 100.0%
Total: 15680

Top Viruses
No Data

Top Virus Victims


No Data

360 Degree Activities Report Page 12


Device: FortiGate-100F | FortiGate Cloud

Top Attacks
No Data

Top Attack Victims


No Data

Top Spam by Source IP


No Data

Queried Botnet C-and-C Domains


No Data

360 Degree Activities Report Page 13


Device: FortiGate-100F | FortiGate Cloud

Applications that have the ability to transfer files can pose a significant risk of data loss: company's customer data, intellectual
property and confidential business trade secrets can be sent out of the organization via these applications. Knowing which types of
files and content are transferred crossing the network can help administrators to mitigate the risk by setting up appropriate
application policies along with data leak prevention rules on the Fortinet next-generation firewall system.

Data Exfiltration Detection and Prevention


Top Data Leak by Rules
No Data

Top Data Leak by Source


No Data

360 Degree Activities Report Page 14


Device: FortiGate-100F | FortiGate Cloud

FortiClient protects your endpoints with an extra layer of security; it's engineered to defeat the latest and most dangerous malware
and provides real-time protection on the company's desktops and mobile devices. FortiClient together with Fortinet next generation
Firewall delivers fully managed and layered security defences.

Endpoint Detection and Prevention


Most At-Risk Devices and Hosts
Source Score %
192.168.72.113-unifi firmware 3875 24.7%
1080 6.9%
192.168.72.116
192.168.72.120-chromeos 1015 6.5%
690 4.4%
192.168.72.181
192.168.72.114 680 4.3%
640 4.1%
192.168.72.133
485 3.1%
192.168.72.25
480 3.1%
192.168.72.101
192.168.72.145 460 2.9%
445 2.8%
192.168.72.167
Other 5830 37.2%
Total: 15680

Traffic by From Country

Colombia = 28.6 GB(65.1%)

United States = 11.9 GB(27%)

65.1% 27% Reserved = 3.1 GB(7.1%)

United Kingdom = 123.1 MB(0.3%)

Canada = 101.4 MB(0.2%)

Other = 115.1 MB(0.3%)

7.1%

360 Degree Activities Report Page 15


Device: FortiGate-100F | FortiGate Cloud

Appendix:Devices
Report is generated from following devices:

FG100FTK22038046

360 Degree Activities Report Page 16

You might also like