Go to Configuration > Threat Intelligence, and then click Directives.
To find the appropriate directive, type "packets" in the search box.
Scroll down on the page to locate the directive titled AV Network attack, too many dropped inbound packets from DST_IP.
Click the clone icon () to clone the directive.
Click YES to confirm when prompted.
The cloned directive appears in the User Contributed category.
Click the pencil icon () to the left of the directive.
A pop-up window appears displaying the global properties of the directive.
Change the name to "AV Network attack, too many dropped on Fortigate".
(Optional) Modify the taxonomy and/or priority of the directive.
Click Save. You may need to scroll down to reveal the button.
In the first rule (first line in the table), under the Data Source column, click the green plus (+) sign to the left of cisco-pix.
The Rule Data Source Configuration window displays.
To find the Fortigate plugin, type "fortigate" in the search box.
To select that plugin, click Fortigate.
In Plugin Signatures, to search for the event type(s) that detects dropped packets, type "drop" in the search box.
3 - Fortigate: Drop Forbidden Traffic lists in the right column.
To select the event type identified, click the plus (+) sign to the right of the event type, or click Add all.
The event type moves to the left column.
For the remaining rules in the directive, do one of the following to select the same event type:
Click the value.
Make the changes inline, and then click OK.
Click the green plus (+) sign.
Make changes in the pop-up window. Notice Source Host and Source Port on the left, Destination Host and Destination Port on the right.
Click the green plus (+) sign.
Repeat step 2 to step 8 in this task.
Click Reload Directives. The text displays in red, suggesting an action.
Click Yes to confirm when prompted.