Setting up FortiAnalyzer is not just about powering on a virtual appliance and pointing a few log sources at it. A sustainable model secures management access, chooses the right operation mode, places devices into the right ADOM structure, plans log retention from the beginning, and treats reporting as part of the initial design. The short answer is this: FortiAnalyzer setup becomes maintainable when initial setup, device authorization, ADOM design, log retention strategy, and reporting flow are handled together.
This guide is especially useful for:
- network teams managing FortiGate and Fortinet infrastructure
- security teams building centralized logging and reporting
- MSP or multi-tenant administrators designing ADOM structure
- IT operations teams deploying FortiAnalyzer for the first time
Quick Summary
- Fortinet’s
Initial setupdocument lays out the activation flow asGUI connection, RAID, network settings, optional ADOMs, administrator accounts, device onboarding, and operation mode. - The
Setting up FortiAnalyzerguide explicitly lists security considerations such as restricting GUI access bytrusted host,UEFI secure boot,trusted platform module, andreal-time file system integrity checking. - According to the FortiAnalyzer
7.6.6documentation, Security Fabric authorization for onboarding a FortiGate requires both FortiAnalyzer and FortiGate to be on at least7.0.1. - The
Authorizing devicespage shows that unauthorized devices are handled fromUnauthorized Devicesunder the root ADOM and should be assigned to the correct ADOM when ADOMs are enabled. - Fortinet’s ADOM best-practice note says that separating high-volume devices from low-volume devices helps prevent quota enforcement from affecting low-volume devices unnecessarily.
- The log-management best-practice guide recommends retaining logs long enough for business requirements and archiving older logs for better performance.
Table of Contents
- What Does FortiAnalyzer Setup Actually Cover?
- What Should the Initial Setup Order Be?
- How Should Device Authorization and ADOM Design Work?
- How Should Log Retention and Reporting Be Designed?
- What Are the Most Common Mistakes?
- Related Content
- Checklist
- Next Step with LeonX
- Frequently Asked Questions
- Sources

Image: Wikimedia Commons - SPNN file server rack.
What Does FortiAnalyzer Setup Actually Cover?
FortiAnalyzer setup is broader than the first login screen. Fortinet’s own documents make it clear that deployment includes networking, disk layout, administrator accounts, device onboarding, log structure, and reporting.
In practice, a sound setup model should answer:
- who is allowed to reach the management interface
- how devices will be authorized
- how
ADOMstructure will be split by tenant or log volume - how long logs should be retained
- whether reports will start from predefined templates or custom definitions
That is why FortiAnalyzer fits most naturally under Hardware & Software Services, while the visibility and correlation side maps directly to SIEM and Security Event Management Integration.
What Should the Initial Setup Order Be?
What is the base activation flow according to Fortinet?
Fortinet’s Initial setup guide lays out the activation flow as:
GUIaccessRAIDconfiguration if supported- network-interface configuration
- optional
ADOMconfiguration - administrator accounts
- device onboarding
- operation-mode configuration
The important detail is that once the administrator accounts are configured, the administrator should log in again with the new account before the operational configuration continues.
What should be secured first?
The Setting up FortiAnalyzer documentation lists several security considerations, especially:
- restricting GUI access by
trusted host trusted platform moduleself-encrypting drivesUEFI secure bootreal-time file system integrity checking
That makes security a day-one setup concern rather than an afterthought.
How Should Device Authorization and ADOM Design Work?
When should Security Fabric authorization be used?
Fortinet’s Adding a FortiGate using Security Fabric authorization document says the workflow is available when both FortiAnalyzer and FortiGate are running 7.0.1 or higher. The high-level flow is:
- configure
Fabric Authorization address and porton FortiAnalyzer - on the FortiGate, open
Security Fabric > Fabric Connectors > Logging & Analytics - enter FortiAnalyzer details
- the connection first appears as
Unauthorized - start the
Authorizeaction from the FortiGate side - log in with FortiAnalyzer administrator credentials and approve
- confirm that the device appears under
Device Manageron FortiAnalyzer
This is a practical way to speed up onboarding when many FortiGates are involved.
How are unauthorized devices approved?
According to Fortinet’s Authorizing devices page, unauthorized devices are handled under root ADOM > Device Manager > Unauthorized Devices. Important details include:
Display Hidden Devicescan be enabled when needed- devices should be assigned to the correct
ADOMduring authorization - if the firmware version conflicts with the ADOM version, a
Version Mismatch Warningcan appear
Fortinet explicitly warns that if authorization continues despite the version mismatch, the selected ADOM may not fully support that device syntax.
How should ADOM structure be designed?
Fortinet’s ADOM Design best-practice guide recommends placing high-log-rate devices and low-log-rate devices into separate ADOMs. This helps keep quota enforcement from affecting lower-volume devices negatively.
The same document also warns that:
- too many ADOMs significantly increase configuration-file size
- that in turn increases backup and restore time
A healthier ADOM model therefore uses:
- tenant separation where it is actually needed
- log-volume separation where it creates value
- operational ownership boundaries
- only as many ADOMs as the business really needs
How Should Log Retention and Reporting Be Designed?
Why should retention be planned early?
Fortinet’s Log Management best-practice guide recommends retaining logs long enough for business requirements while archiving older logs for better performance. That leads to two practical conclusions:
- retention should not be left to default habit
- long-term archive and active analysis should not be treated as the same layer
When central correlation is also required, this should be tied to SIEM and Security Event Management Integration.
How can reporting be started quickly?
Fortinet’s List of report templates and Creating reports from report templates documents show that FortiAnalyzer includes ready-made report templates and that a report can be created from Reports > Report Definitions > All Reports using Create New and then From Template.
This gives two practical advantages:
- fast startup without building every layout from scratch
- the option to customize a standard template to fit the organization
Fortinet also states that report templates do not contain data by themselves and that data is added when the report is generated. That means:
- template design is one layer
- correct data ingestion and retention are another
What Are the Most Common Mistakes?
Creating too many ADOMs
Unnecessary ADOM growth makes configuration, backup, and restore operations heavier than they need to be.
Ignoring version mismatch warnings
Authorizing devices into an incompatible ADOM can lead to incomplete syntax support.
Skipping trusted-host restrictions
If management access is not narrowed, FortiAnalyzer exposes a wider attack surface than necessary.
Treating retention and archive as the same thing
Active analytics retention and long-term archive serve different purposes and should be planned separately.
Ignoring built-in report templates
FortiAnalyzer already includes usable report templates, so starting every reporting task from a blank page wastes time.
Related Content
- How Fortinet Firewall Works: FortiGate Packet Flow Guide
- What Is FortiGate SSL Inspection and How Should It Be Planned?
- FortiAnalyzer Zero Trust Architecture with Fortinet
- How to Configure VLANs on FortiGate
Checklist
-
trusted hostand core management-security settings were defined - network, administrator-account, and operation-mode steps were completed in the right order
- the onboarding method (
Fabric authorizationor manual authorization) was chosen - unauthorized devices were assigned to the correct
ADOM - high-volume and low-volume log sources were evaluated for ADOM separation
- retention and archive periods were documented against business needs
- predefined templates or a custom reporting approach were selected
- central correlation and proposal flow were clarified
Next Step with LeonX
Setting up FortiAnalyzer is more than adding devices and receiving logs. It requires the right ADOM strategy, the right authorization workflow, the right retention model, and the right reporting structure. LeonX supports this through Hardware & Software Services, especially SIEM and Security Event Management Integration, together with Fortinet-oriented network and logging design. To define the rollout plan or request a proposal, continue through the Contact page.
Relevant pages:
- Hardware & Software Services
- SIEM and Security Event Management Integration
- Business Management Services
- Contact
Frequently Asked Questions
What is the first step in FortiAnalyzer setup?
According to Fortinet, the flow starts with GUI access, network settings, administrator accounts, and then device onboarding.
Why is ADOM design so important?
Because log volume, tenant separation, and quota-enforcement behavior are all strongly affected by the ADOM structure.
What does Fabric authorization do?
It provides a faster, more controlled way to authorize FortiGate devices to FortiAnalyzer.
Are built-in report templates sufficient?
For many starting scenarios, yes. They can later be customized when needed.
Sources
- FortiAnalyzer 8.0.0 Administration Guide - Setting up FortiAnalyzer
- FortiAnalyzer 7.6.6 Administration Guide - Initial setup
- FortiAnalyzer 7.6.6 Administration Guide - Adding a FortiGate using Security Fabric authorization
- FortiAnalyzer 8.0.0 Administration Guide - Authorizing devices
- FortiAnalyzer 8.0.0 Best Practices - ADOM Design
- FortiAnalyzer 7.6.0 Best Practices - Log Management
- FortiAnalyzer 8.0.0 Administration Guide - List of report templates
- FortiAnalyzer 8.0.0 Administration Guide - Creating reports from report templates
- Wikimedia Commons - SPNN file server rack



