Deep Analysis

FortiOS 8.0 Generative AI Detection Technology Deep Insight

ChatGPT/Claude Enterprise Traffic Audit & AIAP Database Setup

FortiOS 8.0 Generative AI Detection Technology Deep Insight

1. Functional Overview: Strategic Positioning of GenAI Detection in FortiOS 8.0

1.1 Functional Background and Release Information

FortiOS 8.0, as the latest major version of Fortinet's unified operating system, introduces native detection and control capabilities for Generative AI (GenAI) applications in the network security field. According to Fortinet official documentation, the new features in FortiOS 8.0.0 clearly state:

"Application control support has been added for generative AI to enhance the management and categorization of generative AI signatures. This offers improved visibility and insights into AI-related activities."
Source: FortiOS 8.0.0 New Features - Application control support for generative AI

The introduction of this feature marks Fortinet's official inclusion of Generative AI application security control into its core security architecture system. With the widespread adoption of AI services such as ChatGPT, Claude, and Gemini in enterprise environments, how to effectively control AI tool usage while ensuring business efficiency has become a key challenge for security teams. FortiOS 8.0's GenAI detection feature is designed to address this challenge.

1.2 Core Functional Components

GenAI detection functionality in FortiOS 8.0 contains the following core components, which together constitute a complete AI visibility and control system:

AIAP Database Type Support. FortiOS 8.0 introduces a new AIAP (AI Application Protection) database type, specifically for signature matching of Generative AI rules. This database is continuously maintained by FortiGuard Labs and contains precise identification signatures for mainstream AI applications.

GenAI Dedicated Log Fields. The system adds six dedicated fields in UTM application control logs to record key metadata of AI interactions. These fields cover the complete information chain from user identity to prompt content.

Dedicated Application Category. A new "Generative AI" application category has been added in Security Profiles > Application Signatures, identified as category 36 in CLI, facilitating batch policy configuration for administrators.

FortiView AI Dedicated Widgets. Two new FortiView dashboard widgets - AI Applications and AI Use Cases, for real-time visualization of AI traffic patterns.

1.3 Functional Positioning and Value Proposition

From an enterprise network security perspective, the core value proposition of FortiOS 8.0 GenAI detection functionality is reflected in three dimensions:

First, Shadow AI Discovery and Visibility. Through network-layer detection, identify various AI tools used by employees, helping security teams understand unauthorized AI usage, i.e., Shadow AI phenomenon.

Second, Data Leakage Risk Visualization. By extracting AI interaction metadata (including target data center geographical location, user accounts, prompt content, etc.), help security teams assess potential data leakage risks through AI channels.

Third, Compliance Audit Support. Complete log records and FortiView visualization reports provide technical evidence for meeting increasingly stringent AI regulatory requirements, supporting compliance audit needs.

2. Technical Architecture: FortiOS 8.0 Implementation

2.1 AIAP Database Architecture

AIAP (AI Application Protection) database is the core engine of FortiOS 8.0 GenAI detection functionality. According to official documentation, AIAP database has the following technical characteristics:

Database Type and Update Mechanism. AIAP is an independent database type, updated through FortiGuard Distribution Network (FDN). Similar to traditional application signature libraries, AIAP database uses signature matching to identify AI application traffic. The database version status can be verified through the following CLI command:

# diagnose autoupdate versions | grep -A 6 GenAI GenAI Application Definitions --------- Version: 33.00033 signed Contract Expiry Date: Thu Jan 3 2030 Last Updated using scheduled update on Tue Jun 24 20:59:43 2025 Last Update Attempt: Tue Jun 24 23:10:03 2025 Result: No Updates

Prerequisites for Database Update. Official documentation clearly states that prerequisites for AIAP database update include:

  • Device must have valid FMWR (FortiCare Maintenance & Warranty Renewals) contract
  • At least one firewall policy has Application Control profile enabled
  • FortiGate can normally connect to FortiGuard servers

CLI Category Identifier. Generative AI application category is identified as category 36 in CLI, this value is used when configuring application control entries.

2.2 SSL Deep Inspection Dependency Architecture

Since mainstream AI services are provided through HTTPS access (using TLS 1.2/1.3 encryption), FortiOS 8.0's GenAI detection capability highly depends on SSL Deep Inspection functionality. This architectural design reflects Fortinet's core technical capabilities in encrypted traffic detection.

Man-in-the-Middle Decryption Principle. SSL deep inspection works by establishing bidirectional TLS connections between clients and servers. FortiGate terminates the client's TLS connection while simultaneously establishing a new TLS connection as a client with the target server, performing data forwarding and content inspection between them. This process is transparent to end users.

Association with GenAI Detection. According to official documentation, complete capture of Extended UTM logs (including GenAI dedicated fields such as aiuser, model, prompt, etc.) requires enabling SSL deep inspection. Some GenAI signatures clearly indicate that SSL Deep Inspection is required to work properly, this information can be viewed through the "Requirements" field on the signature details page.

Detection Mode Selection. FortiOS 8.0 supports two SSL detection modes:

Detection ModeDescriptionGenAI Detection Capability
Certificate InspectionOnly check certificate information, do not decrypt contentCan only identify target server, cannot extract AI metadata
Full SSL Inspection (Deep Inspection)Complete decryption and content inspectionFull support for AI application identification and metadata extraction

2.3 Application Control Engine Integration

FortiOS 8.0's GenAI detection functionality is deeply integrated with the existing Application Control security engine, this design decision allows administrators to use familiar security profile systems to control AI applications.

Signature Matching Process. When HTTPS traffic is decrypted through SSL deep inspection, the IPS engine uses protocol decoders to analyze HTTP request content. The application identification module then queries the AIAP database to perform signature matching. If matching is successful, the system extracts relevant metadata and executes corresponding actions according to profile settings.

Hierarchical Relationship between Application Categories and Signatures. In FortiOS 8.0's application control architecture, category 36 (Generative AI) is the highest-level classification unit, containing multiple specific application signatures underneath, for example:

  • OpenAI.ChatGPT_Post (ChatGPT message submission)
  • Google.Gemini_Web (Gemini web version)
  • Amazon.Bedrock_* (AWS Bedrock service)

This hierarchical structure allows administrators to perform coarse-grained category-level control or fine-grained individual signature-level control.

2.4 Log Data Structure

FortiOS 8.0 designed dedicated log field structures for GenAI detection, these fields have corresponding displays in both CLI and GUI:

CLI Log FieldGUI Field NameData MeaningExample Value
aiuserAI UserAI application user accountuser@company.com
modelModelAI model identifiergpt-4, claude-3
dcgeoData Center's Geographical LocationData center geographical regionUS, EU, CN
usecaseUse CaseAI usage scenario classificationConversational_Assistant
promptPromptUser prompt content(Actual input content)
cloudgenaiGenerate AI ApplicationAggregated application informationJSON structure containing multiple dimensions

Complete Log Example. The following is a complete application control log example from official documentation, showing actual values of all GenAI-related fields:

date=2025-06-25 time=00:13:07 eventtime=1750810387445006017 logid="1059028704" type="utm" subtype="app-ctrl" eventtype="signature" level="information" vd="vd1" appid=53323 srcip=10.1.100.126 dstip=110.18.32.47 srcport=59001 dstport=443 service="HTTPS" direction="incoming" policyid=1 sessionid=1299 applist="GenAI" action="pass" appcat="GenAI" app="OpenAI.ChatGPT_Post" msg="GenAI: OpenAI.ChatGPT_Post" usecase="Conversational_Assistant" aiuser="fftntt@gmail.com" model="auto" dcgeo="US" prompt="generate test log for appctrl" cloudgenai="APP=OpenAI.ChatGPT, DCGEO=US, UseCase=Conversational_Assistant, User=fftntt@gmail.com, UserOrganization=org-F2ZasxjlplRvKPgeVfbXbPeM, HistoryTraining=true, Model=auto, Title='AppCtrl Test Log', Prompt='generate test log for appctrl'" apprisk="low"

From this log, the following key information can be extracted:

  • User identity: fftntt@gmail.com
  • AI service: OpenAI ChatGPT
  • AI model: auto (automatic selection)
  • Data center location: United States (US)
  • Usage scenario: Conversational assistant
  • Prompt content: generate test log for appctrl
  • Conversation history training status: HistoryTraining=true

3. Deployment Guide: FortiOS 8.0 Device Operation Steps

3.1 Prerequisite Verification

Before deploying GenAI detection functionality, the following prerequisite verifications need to be completed on FortiOS 8.0 devices. These verification steps ensure the device has the basic environment for normal operation of GenAI detection functionality.

Step 1: Confirm Firmware Version.

Log in to FortiOS 8.0 device management interface, execute the following command to confirm firmware version:

# get system status

Ensure the device is running FortiOS 8.0.0 or higher version.

Step 2: Verify Subscription Status.

Navigate to System > FortiGuard page, or execute the following CLI command to verify subscription status:

# diagnose fortiguard upd-status

Confirm the following subscriptions are active:

  • FortiCare Maintenance & Warranty Renewals (FMWR)
  • Application Control service

Step 3: Verify FortiGuard Connectivity.

# execute ping update.fortiguard.net # execute ping service.fortiguard.net

Ensure the device can normally resolve and access FortiGuard servers.

3.2 Endpoint CA Certificate Deployment

After enabling SSL deep inspection, endpoint devices need to trust the CA certificate used by FortiGate for re-signing, otherwise users will encounter certificate warnings. The following are certificate deployment steps in different operating system environments.

Windows System Certificate Installation Steps:

  1. Log in to FortiGate management interface
  2. Navigate to Security Profiles > SSL/SSH Inspection
  3. Edit the SSL inspection profile being used (system built-in deep-inspection or custom profile)
  4. Click the "Download" button next to CA certificate to download the certificate
  5. On Windows client, double-click the downloaded certificate file
  6. Select "Local Machine" as storage location
  7. Place the certificate in "Trusted Root Certification Authorities" store
  8. Complete the certificate import wizard

macOS System Certificate Installation Steps:

  1. Download Fortinet_CA_SSL certificate file
  2. Open "Keychain Access" application on macOS
  3. Select "System" keychain
  4. Import certificate through "File > Import Items"
  5. Double-click the imported certificate, expand "Trust" options
  6. Set "When using this certificate" to "Always Trust"

Firefox Browser Special Configuration.

Firefox uses independent certificate storage and does not rely on system certificate storage. In Firefox, additional configuration is required:

  1. Open Firefox settings
  2. Navigate to "Privacy & Security" page
  3. In "Certificates" section, check "Allow Firefox to automatically trust third-party certificates you install"

3.3 Application Control Profile Creation

Create GenAI Monitoring Profile via GUI:

  1. Navigate to Security Profiles > Application Control page
  2. Click "Create New" button to create new profile
  3. Enter profile name (such as "GenAI_Monitor")
  4. Find "Generative AI" category in application category list
  5. Set the action for this category to "Monitor"
  6. Configure other parameters as needed
  7. Click "OK" to save profile

3.4 SSL Inspection Profile Configuration

Create SSL/SSH Profile with Deep Inspection Enabled:

  1. Navigate to Security Profiles > SSL/SSH Inspection page
  2. Click "Create New" to create new profile
  3. Configure the following parameters:
    • Name: Enter profile name (such as "new-deep-inspection")
    • SSL Inspection Options > Inspection method: Select "Full SSL Inspection"
    • CA certificate: Select CA certificate for re-signing
  4. In Protocol Port Mapping, ensure HTTPS (port 443) has deep inspection enabled
  5. Click "OK" to save

Create SSL Inspection Profile via CLI:

config firewall ssl-ssh-profile    edit "new-deep-inspection"        config https            set ports 443            set status deep-inspection        end        set caname "Fortinet_CA_SSL"    next end

3.5 Firewall Policy Configuration

Associate Application Control profile and SSL inspection profile to firewall policy:

Configure Firewall Policy via GUI:

  1. Navigate to Policy & Objects > Firewall Policy page
  2. Click "Create New" to create new policy
  3. Configure basic parameters:
    • Name: Policy name
    • Incoming Interface: Source interface (such as port2)
    • Outgoing Interface: Destination interface (such as port1)
    • Source: Source address object
    • Destination: Destination address object
    • Schedule: Schedule time
    • Service: Service type (usually select ALL)
  4. In Security Profiles section:
    • Enable Application Control, select the previously created GenAI profile
    • Set SSL Inspection to profile with deep inspection enabled
  5. Enable UTM status
  6. Enable NAT as needed
  7. Click "OK" to save policy

3.6 FortiView AI Widget Configuration

Add FortiView AI Applications Widget:

  1. Navigate to Dashboard > Status page
  2. Click "Add Widget" button
  3. Select "FortiView AI Applications" in widget list
  4. Configure widget parameters (name, data refresh interval, etc.)
  5. Click "OK" to add widget

Add FortiView AI Use Cases Widget:

Repeat the above steps, select "FortiView AI Use Cases" in widget list.

3.7 Deployment Verification

After completing the above configuration, functional verification is required to ensure GenAI detection works properly.

Step 1: Trigger Test Traffic.

On client PC with CA certificate installed:

  1. Open browser and visit www.chatgpt.com
  2. Log in to AI service account
  3. Enter test prompt (such as "Hello, this is a test")

Step 2: Check Log Generation.

View via GUI: Log & Report > Security Events > Application Control

View via CLI:

# execute log display | grep -i "GenAI"

Step 3: Verify Log Content.

Confirm log contains the following GenAI fields:

  • appcat="GenAI"
  • app="OpenAI.ChatGPT_Post"
  • aiuser, model, dcgeo, usecase, etc. fields have values

Step 4: Verify AIAP Database Update.

# diagnose autoupdate versions | grep -A 6 GenAI

Confirm AIAP database version number is non-zero (such as Version: 33.00033).

4. Configuration Details: FortiOS 8.0 CLI Command Reference

4.1 Application Control Profile CLI Configuration

Basic GenAI Monitoring Configuration (CLI):

config application list    edit "GenAI"        config entries            edit 1                set category 36                set action pass            next        end    next end

Configuration Notes:

  • `category 36`: Specify Generative AI application category
  • `action pass`: Set action to allow (log only)

Monitor Mode Configuration:

If you need to generate UTM alert events while logging, set action to monitor:

config application list    edit "GenAI_Monitor"        config entries            edit 1                set category 36                set action monitor            next        end    next end

Block Mode Configuration:

If you need to block all GenAI traffic:

config application list    edit "GenAI_Block"        config entries            edit 1                set category 36                set action block            next        end    next end

4.2 Firewall Policy CLI Configuration

Associate Application Control and SSL Inspection Configuration to Policy:

config firewall policy    edit 1        set name "GenAI_Inspection_Policy"        set srcintf "port2"        set dstintf "port1"        set action accept        set srcaddr "all"        set dstaddr "all"        set schedule "always"        set service "ALL"        set utm-status enable        set ssl-ssh-profile "new-deep-inspection"        set application-list "GenAI"        set nat enable    next end

Key Parameter Notes:

  • `utm-status enable`: Enable UTM functionality
  • `ssl-ssh-profile "new-deep-inspection"`: Associate deep inspection profile
  • `application-list "GenAI"`: Associate application control profile

4.3 SSL/SSH Inspection Profile CLI Configuration

Create Deep Inspection Profile:

config firewall ssl-ssh-profile    edit "new-deep-inspection"        config https            set ports 443            set status deep-inspection        end        config ftps            set ports 990            set status deep-inspection        end        config imaps            set ports 993            set status deep-inspection        end        config pop3s            set ports 995            set status deep-inspection        end        config smtps            set ports 465            set status deep-inspection        end        set caname "Fortinet_CA_SSL"    next end

4.4 Explicit Proxy Environment Configuration

When using GenAI detection in Explicit Proxy enabled environment, inline IPS needs to be disabled:

config ips settings    set proxy-inline-ips disable end

4.5 Database Status Query Commands

Query AIAP Database Version:

# diagnose autoupdate versions | grep -A 6 GenAI

Expected Output Format:

GenAI Application Definitions --------- Version: XX.XXXXXX signed Contract Expiry Date: [Date] Last Updated using scheduled update on [Date] Last Update Attempt: [Date] Result: No Updates / Update succeeded

Abnormal Situation Diagnosis:

If "Version: 0.00000" is displayed, it indicates AIAP database has not been updated yet, possible reasons include:

  • No firewall policy has Application Control enabled
  • FMWR subscription has expired
  • FortiGate cannot connect to FortiGuard servers

5. Business Process: FortiOS 8.0 System Processing Flow

5.1 Traffic Identification and Policy Matching Flow

When users access AI services through FortiOS 8.0 devices, the system processes traffic according to the following flow:

Phase 1: Connection Establishment and Policy Matching.

  1. Client initiates HTTPS connection request to AI service (such as chat.openai.com)
  2. FortiGate receives incoming traffic packets
  3. Firewall engine queries policy table, executes policy matching
  4. After finding matching policy, checks if SSL/SSH inspection and UTM functionality are enabled
  5. If deep inspection is enabled, enter SSL decryption flow

Phase 2: SSL Deep Inspection Flow.

  1. FortiGate impersonates target server, generates forged certificate using local CA certificate
  2. Client establishes TLS connection with FortiGate (frontend connection)
  3. FortiGate simultaneously establishes TLS connection as client with real AI server (backend connection)
  4. FortiGate forwards data between two TLS connections
  5. Traffic is decrypted to plaintext inside FortiGate

Phase 3: Application Layer Inspection and Signature Matching.

  1. IPS engine's protocol decoder analyzes decrypted HTTP requests
  2. Application identification module queries AIAP database
  3. Execute signature pattern matching, identify AI application type
  4. If matching is successful, extract GenAI-related metadata
  5. Execute policy action according to profile settings

Phase 4: Response Generation and Data Forwarding.

  1. Generate application control log containing GenAI fields
  2. Determine traffic handling method according to action settings:
    • Monitor/Pass: Forward decrypted traffic
    • Block: Terminate connection, return replacement page
  3. Re-encrypt traffic and forward to target recipient

5.2 Log Generation and Reporting Flow

Local Log Generation.

After detecting GenAI traffic, FortiGate automatically generates UTM application control logs containing complete GenAI metadata fields. Logs are stored on device local disk and can be viewed through:

  • GUI: Log & Report > Security Events
  • CLI: execute log display

FortiAnalyzer Reporting.

If FortiGate is configured with FortiAnalyzer log reporting, logs are synchronously sent to FortiAnalyzer for centralized storage and analysis. On FortiAnalyzer, you can:

  • View cross-device AI traffic aggregated data
  • Generate periodic AI usage reports
  • Configure alert rules based on GenAI fields

FortiView Real-time Aggregation.

FortiView module aggregates GenAI log data in real-time, displaying on dashboard:

  • AI Applications widget: Traffic ranking by AI application classification
  • AI Use Cases widget: Traffic ranking by usage scenario classification

6. Authorization and Purchase: FortiOS 8.0 License Requirements

6.1 FortiGuard Subscription Service System

FortiOS 8.0's GenAI detection functionality depends on Fortinet's FortiGuard subscription service system. According to official documentation and related product materials, this functionality requires the following types of subscription authorization:

FMWR (FortiCare Maintenance & Warranty Renewals).

FMWR is FortiGate device's basic maintenance contract, main functions include:

  • Firmware version upgrade rights
  • Technical support services
  • FortiGuard database update rights

According to official instructions, AIAP database update requires valid FMWR contract.

Application Control Service.

Application Control is one of the security services included in multiple FortiGuard security bundles:

  • UTP (Unified Threat Protection) Bundle
  • Enterprise Protection Bundle
  • Advanced Threat Protection (ATP) Bundle

6.2 Subscription Bundle Comparison

According to Fortinet official product materials and licensing guides, the functional coverage of each subscription bundle is as follows:

Bundle NameIncludes Application ControlIncludes DLPIncludes AI Security FeaturesApplicable Scenarios
FortiCare Basic ContractBasic support only
UTP BundleSME basic protection
ATP BundlePartialAdvanced threat protection
Enterprise ProtectionLarge enterprise comprehensive protection

6.3 Subscription Expiration Impact

When related subscriptions expire, the following impacts will occur:

FMWR Expiration Impact:

FunctionPost-Expiration Status
Firmware UpgradeBlocked from upgrading to new versions
FortiGuard UpdatesStop updates
AIAP DatabaseStop updates (downloaded version still usable)

Application Control Subscription Expiration Impact:

FunctionPost-Expiration Status
New Signature DownloadStop
Deployed DetectionContinue working (using last downloaded signatures)
New AI Application IdentificationUnable to identify

6.4 Purchase Recommendations

According to different enterprise scales and AI security needs, recommended subscription schemes are as follows:

Small and Medium Enterprises (less than 100 employees):

Recommended Bundle: UTP Bundle

  • Includes complete Application Control functionality
  • Includes IPS, antivirus, web filtering and other basic security services
  • High cost-effectiveness, meets basic AI visibility needs

Medium to Large Enterprises (100-1000 employees):

Recommended Bundle: Enterprise Protection

  • Includes Application Control and DLP
  • Supports data leakage prevention and AI usage linkage control
  • Includes AI-based Inline Malware Prevention

Large Enterprises/High Security Requirement Environments:

Recommended Bundle: Enterprise Protection + FortiAnalyzer + SOCaaS

  • Complete AI visibility and control
  • Centralized log analysis and reporting
  • Security Operations Center managed services

7. Summary and Outlook

7.1 Functional Value Review

FortiOS 8.0's GenAI detection functionality brings the following core values to enterprise network security architecture:

Native Integration, Easy Deployment. As a core security feature of FortiOS 8.0, GenAI detection is seamlessly integrated with existing Application Control and SSL deep inspection systems. Administrators can quickly deploy AI control capabilities using familiar configuration patterns without learning entirely new security modules.

Rich Metadata, Complete Visibility. Through six dedicated log fields (aiuser, model, dcgeo, usecase, prompt, cloudgenai), the system can record complete contextual information of AI interactions, providing solid data support for security analysis and compliance audits.

Intuitive Visualization, Efficient Operations. FortiView AI Applications and AI Use Cases widgets provide intuitive AI usage pattern display, helping security teams quickly understand AI usage within the organization and identify high-risk behaviors.

7.2 Technology Evolution Trends

Looking ahead, the GenAI security control field will present the following technology development trends:

Intelligent AI Application Identification. With the diversification of AI service forms (API calls, SDK integration, Agent frameworks, etc.), traditional signature matching methods may face challenges. Fortinet may introduce more AI/ML technologies to achieve automatic identification of unknown AI applications.

Deep Integration with DLP. AI usage is closely related to data leakage risks. Future versions may enhance GenAI detection and DLP integration capabilities, providing more precise sensitive information detection and blocking.

Extension to Runtime Security. Network layer traffic inspection is the first line of defense for AI security. For more complex threats (such as prompt injection, model adversarial attacks), it needs to be combined with runtime security technologies to form a complete AI security protection system.

7.3 Implementation Recommendations

For enterprises planning to deploy GenAI detection functionality in FortiOS 8.0 environment, it is recommended to follow the following implementation path:

Phase 1: Assessment and Preparation (1-2 weeks).

  • Confirm device firmware version and subscription status
  • Assess network architecture, determine deployment scope
  • Prepare CA certificate and endpoint distribution plan

Phase 2: Pilot Deployment (2-4 weeks).

  • Deploy GenAI detection in partial areas
  • Use Monitor mode to collect baseline data
  • Analyze AI usage status and risk points

Phase 3: Policy Optimization and Operations (Continuous).

  • Formulate AI usage policy based on pilot data
  • Gradually adjust policy to target state
  • Establish continuous monitoring and reporting mechanisms

Through a progressive implementation path, enterprises can effectively control security risks brought by Generative AI while ensuring business efficiency.

References

  1. FortiOS 8.0.0 New Features - Application control support for generative AI. https://docs.fortinet.com/document/fortigate/8.0.0/new-features/679448/application-control-support-for-generative-ai
  2. FortiOS 8.0 Administration Guide - Protecting GenAI access using application control. https://docs.fortinet.com/document/fortigate/8.0.0/administration-guide/679448/protecting-genai-access-using-application-control
  3. FortiGuard Enterprise Protection Bundle Product Information. https://www.cdw.com/product/fortiguard-enterprise-protection-bundle-subscription-license-renewal-3-y/7838230
  4. FortiGate License Upgrade Restriction Instructions. https://handbook.fortinet.com.cn/system_mgmt/firmware_and_config/firmware_version/firmware_license.html
🎯

Why it Matters

FortiOS 8.0's GenAI detection functionality provides enterprises with a complete AI visibility and control system, a key technical means to address Shadow AI and data leakage risks, meeting the urgent needs of enterprises for AI tool control.

PRO

DECISION

For enterprises using FortiGate, it is recommended to deploy GenAI detection functionality in Monitor mode first, establish AI usage baseline before gradually transitioning to stricter control policies, while assessing SSL deep inspection deployment costs and endpoint certificate distribution complexity.

🔮 PRO

PREDICT

In the future, GenAI detection may be deeply integrated with DLP to achieve sensitive information detection in AI interaction content, while potentially introducing AI-driven signature generation capabilities to achieve rapid identification of emerging AI applications.

💬 Comments (0)