Which two methods are the most common methods to control and restrict administrative access on FortiAnalyzer? (Choose two.)
An administrator has configured the following settings:
config system global
set log-checksum md5-auth
end
What is the significance of executing this command?
Which two of the following must you configure on FortiAnalyzer to email a FortiAnalyzer report externally?
(Choose two.)
For which two purposes would you use the command set log checksum? (Choose two.)
To prevent logs from being tampered with while in storage, you can add a log checksum using the config
system global command. You can configure FortiAnalyzer to record a log file hash value, timestamp, and
authentication code when the log is rolled and archived and when the log is uploaded (if that feature is
enabled). This can also help against man-in-the-middle only for the transmission from FortiAnalyzer to an
SSH File Transfer Protocol (SFTP) server during log upload.
FortiAnalyzer_7.0_Study_Guide-Online page 149